Skip to content

Instantly share code, notes, and snippets.

@yangm97
Created January 29, 2019 15:17
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save yangm97/f9bbcde781150c06b7f0bf94dfdc8d41 to your computer and use it in GitHub Desktop.
Save yangm97/f9bbcde781150c06b7f0bf94dfdc8d41 to your computer and use it in GitHub Desktop.
Last login: Tue Jan 29 12:49:40 on ttys002
~/D/P/m/kubespray ❯❯❯ ansible-playbook -i inventory/yetanothernerd/hosts.ini cluster.yml -b -v --user ansible master ✭ ◼
Using /Users/yan/Documents/Projects/monstrinho/kubespray/ansible.cfg as config file
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet host_list requirements, check plugin documentation if this is unexpected
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet script requirements, check plugin documentation if this is unexpected
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet yaml requirements, check plugin documentation if this is unexpected
PLAY [localhost] *****************************************************************************************************************************************************************************************************************************
TASK [Check ansible version !=2.7.0] *********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.106) 0:00:00.106 *******
ok: [localhost] => {
"changed": false,
"msg": "All assertions passed"
}
[WARNING]: Could not match supplied host pattern, ignoring: bastion
PLAY [bastion[0]] ****************************************************************************************************************************************************************************************************************************
skipping: no hosts matched
[WARNING]: Could not match supplied host pattern, ignoring: calico-rr
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.093) 0:00:00.199 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.052) 0:00:00.251 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.511) 0:00:00.762 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.499) 0:00:01.262 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.048) 0:00:01.310 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [bootstrap-os : Fetch /etc/os-release] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.125) 0:00:01.436 *******
ok: [monstrinho] => {"changed": false, "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "NAME=\"Ubuntu\"\r\nVERSION=\"18.04.1 LTS (Bionic Beaver)\"\r\nID=ubuntu\r\nID_LIKE=debian\r\nPRETTY_NAME=\"Ubuntu 18.04.1 LTS\"\r\nVERSION_ID=\"18.04\"\r\nHOME_URL=\"https://www.ubuntu.com/\"\r\nSUPPORT_URL=\"https://help.ubuntu.com/\"\r\nBUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"\r\nPRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"\r\nVERSION_CODENAME=bionic\r\nUBUNTU_CODENAME=bionic\r\n", "stdout_lines": ["NAME=\"Ubuntu\"", "VERSION=\"18.04.1 LTS (Bionic Beaver)\"", "ID=ubuntu", "ID_LIKE=debian", "PRETTY_NAME=\"Ubuntu 18.04.1 LTS\"", "VERSION_ID=\"18.04\"", "HOME_URL=\"https://www.ubuntu.com/\"", "SUPPORT_URL=\"https://help.ubuntu.com/\"", "BUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"", "PRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"", "VERSION_CODENAME=bionic", "UBUNTU_CODENAME=bionic"]}
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.185) 0:00:01.621 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/bootstrap-os/tasks/bootstrap-ubuntu.yml for monstrinho
TASK [bootstrap-os : List ubuntu_packages] ***************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.093) 0:00:01.715 *******
ok: [monstrinho] => {"ansible_facts": {"ubuntu_packages": ["python", "python-apt", "python-pip", "dbus"]}, "changed": false}
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.122) 0:00:01.837 *******
ok: [monstrinho] => (item=python) => {"changed": false, "failed_when_result": false, "item": "python", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python\r\n", "stdout_lines": ["python"]}
ok: [monstrinho] => (item=python-apt) => {"changed": false, "failed_when_result": false, "item": "python-apt", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python-apt\r\n", "stdout_lines": ["python-apt"]}
ok: [monstrinho] => (item=python-pip) => {"changed": false, "failed_when_result": false, "item": "python-pip", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python-pip\r\n", "stdout_lines": ["python-pip"]}
ok: [monstrinho] => (item=dbus) => {"changed": false, "failed_when_result": false, "item": "dbus", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "dbus\r\n", "stdout_lines": ["dbus"]}
TASK [bootstrap-os : Add proxy to /etc/apt/apt.conf if http_proxy is defined] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.469) 0:00:02.306 *******
TASK [bootstrap-os : Add proxy to /etc/apt/apt.conf if https_proxy is defined] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.071) 0:00:02.377 *******
TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.061) 0:00:02.439 *******
TASK [bootstrap-os : set_fact] ***************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.064) 0:00:02.504 *******
ok: [monstrinho] => {"ansible_facts": {"ansible_python_interpreter": "/usr/bin/python"}, "changed": false}
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.247) 0:00:02.751 *******
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.066) 0:00:02.818 *******
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.058) 0:00:02.876 *******
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.063) 0:00:02.939 *******
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.067) 0:00:03.006 *******
TASK [bootstrap-os : include_tasks] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.066) 0:00:03.073 *******
TASK [bootstrap-os : Remove require tty] *****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.064) 0:00:03.137 *******
ok: [monstrinho] => {"backup": "", "changed": false, "found": 0, "msg": ""}
TASK [bootstrap-os : Create remote_tmp for it is used by another module] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.717) 0:00:03.855 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.ansible/tmp", "size": 2, "state": "directory", "uid": 0}
TASK [bootstrap-os : Gather nodes hostnames] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:45 -0200 (0:00:00.709) 0:00:04.565 *******
ok: [monstrinho]
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS and Tumbleweed)] ********************************************************************************************************************************************
Tuesday 29 January 2019 13:09:46 -0200 (0:00:01.007) 0:00:05.572 *******
ok: [monstrinho] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "monstrinho.cluster.local", "ansible_hostname": "monstrinho", "ansible_nodename": "monstrinho"}, "changed": false, "name": "monstrinho"}
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS and Tumbleweed only)] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:09:48 -0200 (0:00:01.610) 0:00:07.183 *******
TASK [bootstrap-os : Update hostname fact (CoreOS and Tumbleweed only)] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:48 -0200 (0:00:00.061) 0:00:07.244 *******
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************
TASK [gather facts from all instances] *******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:48 -0200 (0:00:00.120) 0:00:07.365 *******
ok: [monstrinho -> None] => (item=monstrinho)
ok: [monstrinho -> None] => (item=monstrinho)
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:50 -0200 (0:00:01.639) 0:00:09.004 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:50 -0200 (0:00:00.055) 0:00:09.059 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:50 -0200 (0:00:00.541) 0:00:09.600 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.513) 0:00:10.114 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.054) 0:00:10.168 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.155) 0:00:10.323 *******
ok: [monstrinho] => {"changed": false, "gid": 998, "name": "kube-cert", "state": "present", "system": true}
TASK [adduser : User | Create User] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:52 -0200 (0:00:00.705) 0:00:11.029 *******
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 998, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999}
TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:52 -0200 (0:00:00.487) 0:00:11.517 *******
ok: [monstrinho] => (item=swap) => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "item": "swap", "name": "swap", "opts": "defaults", "passno": "0"}
ok: [monstrinho] => (item=none) => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "item": "none", "name": "none", "opts": "defaults", "passno": "0"}
TASK [kubernetes/preinstall : Disable swap] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.583) 0:00:12.100 *******
TASK [kubernetes/preinstall : Stop if ansible version is too low] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.060) 0:00:12.161 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if either kube-master, kube-node or etcd is empty] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.180) 0:00:12.342 *******
ok: [monstrinho] => (item=kube-master) => {
"changed": false,
"item": "kube-master",
"msg": "All assertions passed"
}
ok: [monstrinho] => (item=kube-node) => {
"changed": false,
"item": "kube-node",
"msg": "All assertions passed"
}
ok: [monstrinho] => (item=etcd) => {
"changed": false,
"item": "etcd",
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if non systemd OS type] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.203) 0:00:12.546 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown OS] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.182) 0:00:12.728 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown network plugin] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.148) 0:00:12.876 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.152) 0:00:13.029 *******
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ***********************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.058) 0:00:13.088 *******
ok: [monstrinho] => (item={u'name': u'download_run_once', u'value': False}) => {
"changed": false,
"item": {
"name": "download_run_once",
"value": false
},
"msg": "All assertions passed"
}
ok: [monstrinho] => (item={u'name': u'deploy_netchecker', u'value': False}) => {
"changed": false,
"item": {
"name": "deploy_netchecker",
"value": false
},
"msg": "All assertions passed"
}
ok: [monstrinho] => (item={u'name': u'download_always_pull', u'value': False}) => {
"changed": false,
"item": {
"name": "download_always_pull",
"value": false
},
"msg": "All assertions passed"
}
ok: [monstrinho] => (item={u'name': u'helm_enabled', u'value': False}) => {
"changed": false,
"item": {
"name": "helm_enabled",
"value": false
},
"msg": "All assertions passed"
}
ok: [monstrinho] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => {
"changed": false,
"item": {
"name": "openstack_lbaas_enabled",
"value": false
},
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.288) 0:00:13.377 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if memory is too small for masters] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.164) 0:00:13.541 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.153) 0:00:13.695 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.149) 0:00:13.844 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.156) 0:00:14.001 *******
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.053) 0:00:14.054 *******
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.065) 0:00:14.119 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when OCI cloud controller is enabled] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.160) 0:00:14.280 *******
TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ********************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.053) 0:00:14.333 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if kernel version is too low] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.148) 0:00:14.482 *******
TASK [kubernetes/preinstall : Stop if bad hostname] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.052) 0:00:14.534 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : check cloud_provider value] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.162) 0:00:14.697 *******
TASK [kubernetes/preinstall : Get current version of calico cluster version] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.082) 0:00:14.779 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl version | grep 'Cluster Version:' | awk '{ print $3}'", "delta": "0:00:02.119737", "end": "2019-01-29 13:09:59.344233", "rc": 0, "start": "2019-01-29 13:09:57.224496", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "v3.1.3", "stdout_lines": ["v3.1.3"]}
TASK [kubernetes/preinstall : Check that calico version is enough for upgrade] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:58 -0200 (0:00:02.506) 0:00:17.285 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Check that kube_service_addresses is a network range] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.174) 0:00:17.460 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Check that kube_pods_subnet is a network range] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.146) 0:00:17.607 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Check that kube_pods_subnet does not collide with kube_service_addresses] **************************************************************************************************************************************
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.148) 0:00:17.755 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown dns mode] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.150) 0:00:17.906 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown kube proxy mode] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.150) 0:00:18.057 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if vault is chose] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.161) 0:00:18.218 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown cert_management] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.151) 0:00:18.370 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Stop if unknown resolvconf_mode] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.149) 0:00:18.519 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.164) 0:00:18.684 *******
ok: [monstrinho -> localhost] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.424) 0:00:19.109 *******
TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.067) 0:00:19.176 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.057) 0:00:19.234 *******
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false}
TASK [kubernetes/preinstall : ansible_architecture_rename] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.170) 0:00:19.404 *******
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false}
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.147) 0:00:19.551 *******
TASK [kubernetes/preinstall : check if atomic host] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.052) 0:00:19.603 *******
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.290) 0:00:19.894 *******
ok: [monstrinho] => {"ansible_facts": {"is_atomic": false}, "changed": false}
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.167) 0:00:20.061 *******
TASK [kubernetes/preinstall : check resolvconf] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.051) 0:00:20.112 *******
ok: [monstrinho] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002216", "end": "2019-01-29 13:10:02.465701", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:10:02.463485", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.272) 0:00:20.385 *******
ok: [monstrinho] => {"ansible_facts": {"resolvconf": false}, "changed": false}
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.174) 0:00:20.559 *******
ok: [monstrinho] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "cloud_resolver": []}, "changed": false}
TASK [kubernetes/preinstall : check if kubelet is configured] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.152) 0:00:20.712 *******
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548773223.1382842, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "e3636281c3fa1cfa88a1bf04b15e5c63b6af3133", "ctime": 1548773213.410339, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201881, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1548773213.270339, "nlink": 1, "path": "/etc/kubernetes/kubelet.env", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1775, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/preinstall : check if early DNS configuration stage] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.286) 0:00:20.998 *******
ok: [monstrinho] => {"ansible_facts": {"dns_early": false}, "changed": false}
TASK [kubernetes/preinstall : target resolv.conf files] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.190) 0:00:21.189 *******
ok: [monstrinho] => {"ansible_facts": {"base": "", "head": "", "resolvconffile": "/etc/resolv.conf"}, "changed": false}
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] ***************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.156) 0:00:21.345 *******
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.057) 0:00:21.403 *******
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.322) 0:00:21.725 *******
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.059) 0:00:21.785 *******
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548769633.648093, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1538549416.8988576, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 12381, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1507812486.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.545) 0:00:22.330 *******
ok: [monstrinho] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false}
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.169) 0:00:22.500 *******
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.057) 0:00:22.558 *******
ok: [monstrinho] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false}
TASK [kubernetes/preinstall : generate search domains to resolvconf] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.166) 0:00:22.724 *******
ok: [monstrinho] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false}
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.152) 0:00:22.876 *******
ok: [monstrinho] => {"ansible_facts": {"dnsmasq_server": ["10.233.0.3"]}, "changed": false}
TASK [kubernetes/preinstall : generate nameservers to resolvconf] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.153) 0:00:23.030 *******
ok: [monstrinho] => {"ansible_facts": {"nameserverentries": "nameserver 10.233.0.3", "supersede_nameserver": "supersede domain-name-servers 10.233.0.3;"}, "changed": false}
TASK [kubernetes/preinstall : gather os specific variables] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.158) 0:00:23.188 *******
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"}
TASK [kubernetes/preinstall : force kube_proxy removal if proxy services are replaced by other means] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.166) 0:00:23.355 *******
ok: [monstrinho] => {"ansible_facts": {"kube_proxy_remove": false}, "changed": false}
TASK [kubernetes/preinstall : override kube_proxy_mode to ipvs if kube_proxy_remove is set, as ipvs won't require kube-proxy cleanup when kube-proxy daemonset gets deleted] *****************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.156) 0:00:23.512 *******
TASK [kubernetes/preinstall : Create kubernetes directories] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.053) 0:00:23.565 *******
ok: [monstrinho] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 10, "state": "directory", "uid": 999}
ok: [monstrinho] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 35, "state": "directory", "uid": 999}
ok: [monstrinho] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 15, "state": "directory", "uid": 999}
ok: [monstrinho] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 5, "state": "directory", "uid": 999}
ok: [monstrinho] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 2, "state": "directory", "uid": 999}
TASK [kubernetes/preinstall : Create cni directories] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:06 -0200 (0:00:01.599) 0:00:25.165 *******
ok: [monstrinho] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 3, "state": "directory", "uid": 999}
changed: [monstrinho] => (item=/opt/cni/bin) => {"changed": true, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 16, "state": "directory", "uid": 999}
ok: [monstrinho] => (item=/var/lib/calico) => {"changed": false, "gid": 0, "group": "root", "item": "/var/lib/calico", "mode": "0755", "owner": "kube", "path": "/var/lib/calico", "size": 3, "state": "directory", "uid": 999}
TASK [kubernetes/preinstall : Create local volume provisioner directories] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:06 -0200 (0:00:00.656) 0:00:25.822 *******
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.089) 0:00:25.912 *******
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.096) 0:00:26.008 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.103) 0:00:26.112 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.151) 0:00:26.264 *******
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.108) 0:00:26.372 *******
TASK [kubernetes/preinstall : persist resolvconf cloud init file] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.057) 0:00:26.430 *******
TASK [kubernetes/preinstall : Update package management cache (YUM)] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.058) 0:00:26.488 *******
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.050) 0:00:26.539 *******
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.053) 0:00:26.593 *******
TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.051) 0:00:26.644 *******
TASK [kubernetes/preinstall : Update package management cache (APT)] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.052) 0:00:26.696 *******
ok: [monstrinho] => {"cache_update_time": 1548772906, "cache_updated": false, "changed": false}
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:08 -0200 (0:00:01.058) 0:00:27.755 *******
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:08 -0200 (0:00:00.065) 0:00:27.820 *******
TASK [kubernetes/preinstall : Update common_required_pkgs with ipvsadm when kube_proxy_mode is ipvs] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:10:09 -0200 (0:00:00.074) 0:00:27.895 *******
ok: [monstrinho] => {"ansible_facts": {"common_required_pkgs": ["python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip", "ipvsadm"]}, "changed": false}
TASK [kubernetes/preinstall : Install packages requirements] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:09 -0200 (0:00:00.169) 0:00:28.064 *******
ok: [monstrinho] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip', u'ipvsadm']) => {"attempts": 1, "cache_update_time": 1548772906, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip", "ipvsadm"]}
TASK [kubernetes/preinstall : Install ipvsadm for ClearLinux] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:10 -0200 (0:00:01.360) 0:00:29.425 *******
TASK [kubernetes/preinstall : Confirm selinux deployed] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.060) 0:00:29.485 *******
TASK [kubernetes/preinstall : Set selinux policy] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.076) 0:00:29.562 *******
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.074) 0:00:29.636 *******
TASK [kubernetes/preinstall : Stat sysctl file configuration] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.062) 0:00:29.699 *******
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548693575.5387287, "attr_flags": "", "attributes": [], "block_size": 512, "blocks": 1, "charset": "binary", "ctime": 1548529298.9829907, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 443132, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1547046713.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}}
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.298) 0:00:29.997 *******
ok: [monstrinho] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false}
TASK [kubernetes/preinstall : Make sure sysctl file path folder exists] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.198) 0:00:30.196 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc", "size": 252, "state": "directory", "uid": 0}
TASK [kubernetes/preinstall : Enable ip forwarding] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.292) 0:00:30.489 *******
ok: [monstrinho] => {"changed": false}
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.539) 0:00:31.028 *******
ok: [monstrinho] => {"changed": false, "msg": ""}
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.597) 0:00:31.626 *******
TASK [kubernetes/preinstall : Hosts | Retrieve hosts file content] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.072) 0:00:31.699 *******
ok: [monstrinho] => {"changed": false, "content": "MTI3LjAuMC4xIGxvY2FsaG9zdCBsb2NhbGhvc3QubG9jYWxkb21haW4KOjoxIGxvY2FsaG9zdDYgbG9jYWxob3N0Ni5sb2NhbGRvbWFpbgpmZjAyOjoxCQlpcDYtYWxsbm9kZXMKZmYwMjo6MgkJaXA2LWFsbHJvdXRlcnMKCiMgQW5zaWJsZSBpbnZlbnRvcnkgaG9zdHMgQkVHSU4KMTAuMC4xLjIgbW9uc3RyaW5obyBtb25zdHJpbmhvLmNsdXN0ZXIubG9jYWwKIyBBbnNpYmxlIGludmVudG9yeSBob3N0cyBFTkQK", "encoding": "base64", "source": "/etc/hosts"}
TASK [kubernetes/preinstall : Hosts | Extract existing entries for localhost from hosts file] ************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.498) 0:00:32.198 *******
ok: [monstrinho] => (item=127.0.0.1 localhost localhost.localdomain) => {"ansible_facts": {"etc_hosts_localhosts_dict": {"127.0.0.1": ["localhost", "localhost.localdomain"]}}, "changed": false, "item": "127.0.0.1 localhost localhost.localdomain"}
ok: [monstrinho] => (item=::1 localhost6 localhost6.localdomain) => {"ansible_facts": {"etc_hosts_localhosts_dict": {"127.0.0.1": ["localhost", "localhost.localdomain"], "::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": "::1 localhost6 localhost6.localdomain"}
TASK [kubernetes/preinstall : Hosts | Update target hosts file entries dict with required entries] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.295) 0:00:32.494 *******
ok: [monstrinho] => (item={'value': {u'expected': [u'localhost6', u'localhost6.localdomain'], u'unexpected': [u'localhost', u'localhost.localdomain']}, 'key': u'::1'}) => {"ansible_facts": {"etc_hosts_localhosts_dict_target": {"::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": {"key": "::1", "value": {"expected": ["localhost6", "localhost6.localdomain"], "unexpected": ["localhost", "localhost.localdomain"]}}}
ok: [monstrinho] => (item={'value': {u'expected': [u'localhost', u'localhost.localdomain']}, 'key': u'127.0.0.1'}) => {"ansible_facts": {"etc_hosts_localhosts_dict_target": {"127.0.0.1": ["localhost", "localhost.localdomain"], "::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": {"key": "127.0.0.1", "value": {"expected": ["localhost", "localhost.localdomain"]}}}
TASK [kubernetes/preinstall : Hosts | Update (if necessary) hosts file] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.182) 0:00:32.677 *******
ok: [monstrinho] => (item={'value': [u'localhost6', u'localhost6.localdomain'], 'key': u'::1'}) => {"backup": "", "changed": false, "item": {"key": "::1", "value": ["localhost6", "localhost6.localdomain"]}, "msg": ""}
ok: [monstrinho] => (item={'value': [u'localhost', u'localhost.localdomain'], 'key': u'127.0.0.1'}) => {"backup": "", "changed": false, "item": {"key": "127.0.0.1", "value": ["localhost", "localhost.localdomain"]}, "msg": ""}
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.443) 0:00:33.120 *******
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.060) 0:00:33.180 *******
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.080) 0:00:33.261 *******
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.075) 0:00:33.337 *******
ok: [monstrinho] => {"changed": false, "msg": ""}
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.291) 0:00:33.628 *******
ok: [monstrinho] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"}
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.274) 0:00:33.903 *******
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/preinstall : install growpart] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.266) 0:00:34.169 *******
TASK [kubernetes/preinstall : check if growpart needs to be run] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.074) 0:00:34.244 *******
TASK [kubernetes/preinstall : check fs type] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.075) 0:00:34.319 *******
TASK [kubernetes/preinstall : run growpart] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.076) 0:00:34.396 *******
TASK [kubernetes/preinstall : run xfs_growfs] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.074) 0:00:34.470 *******
TASK [container-engine/cri-o : gather os specific variables] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.064) 0:00:34.535 *******
TASK [container-engine/cri-o : Add OpenShift Origin repository] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.077) 0:00:34.613 *******
TASK [container-engine/cri-o : Make sure needed folders exist in the system] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.076) 0:00:34.690 *******
TASK [container-engine/cri-o : Install cri-o packages] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.093) 0:00:34.783 *******
TASK [container-engine/cri-o : Install cri-o config] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.082) 0:00:34.865 *******
TASK [container-engine/cri-o : Copy mounts.conf] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.078) 0:00:34.943 *******
TASK [container-engine/cri-o : Create directory for oci hooks] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.061) 0:00:35.005 *******
TASK [container-engine/cri-o : Install cri-o service] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.072) 0:00:35.077 *******
TASK [container-engine/rkt : gather os specific variables for rkt] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.068) 0:00:35.146 *******
TASK [container-engine/rkt : install rkt pkg on ubuntu] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.111) 0:00:35.257 *******
TASK [container-engine/rkt : install rkt pkg on fedora] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.071) 0:00:35.329 *******
TASK [container-engine/rkt : install rkt pkg on centos] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.068) 0:00:35.397 *******
TASK [container-engine/rkt : install rkt pkg on openSUSE] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.065) 0:00:35.463 *******
TASK [container-engine/rkt : Set up cron job to do garbage cleanup] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.075) 0:00:35.538 *******
TASK [container-engine/docker-storage : docker-storage-setup | install git and make] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.073) 0:00:35.611 *******
TASK [container-engine/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] **************************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.094) 0:00:35.706 *******
TASK [container-engine/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] ***********************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.054) 0:00:35.761 *******
TASK [container-engine/docker-storage : docker-storage-override | docker service storage-setup override file] ********************************************************************************************************************************
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.076) 0:00:35.837 *******
TASK [container-engine/docker-storage : docker-storage-setup | install lvm2] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.058) 0:00:35.895 *******
TASK [container-engine/docker-storage : docker-storage-setup | install and run container-storage-setup] **************************************************************************************************************************************
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.073) 0:00:35.969 *******
TASK [container-engine/docker : check if atomic host] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.060) 0:00:36.029 *******
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}}
TASK [container-engine/docker : set_fact] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.616) 0:00:36.645 *******
ok: [monstrinho] => {"ansible_facts": {"is_atomic": false}, "changed": false}
TASK [container-engine/docker : gather os specific variables] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.177) 0:00:36.822 *******
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/../vars/ubuntu-bionic.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb [arch=amd64] {{ docker_ubuntu_repo_base_url }} bionic stable\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["9DC858229FC7DD38854AE2D88D81803C0EBFCD88"], "url": "{{ docker_ubuntu_repo_gpgkey }}"}, "docker_versioned_pkg": {"18.03": "docker-ce=18.03.1~ce-3-0~ubuntu", "18.06": "docker-ce=18.06.1~ce~3-0~ubuntu", "18.09": "docker-ce_18.09.1~3-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-ce=18.06.1~ce~3-0~ubuntu", "latest": "docker-ce", "stable": "docker-ce=18.06.1~ce~3-0~ubuntu"}, "use_docker_engine": false}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/ubuntu-bionic.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/../vars/ubuntu-bionic.yml"}
TASK [container-engine/docker : Warn about Docker version on SUSE] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.183) 0:00:37.006 *******
TASK [container-engine/docker : include_tasks] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.062) 0:00:37.068 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/tasks/set_facts_dns.yml for monstrinho
TASK [container-engine/docker : set dns server for docker] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.121) 0:00:37.189 *******
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": []}, "changed": false}
TASK [container-engine/docker : show docker_dns_servers] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.258) 0:00:37.448 *******
ok: [monstrinho] => {
"msg": []
}
TASK [container-engine/docker : set base docker dns facts] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.269) 0:00:37.718 *******
ok: [monstrinho] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
TASK [container-engine/docker : add upstream dns servers (only when dnsmasq is not used)] ****************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.157) 0:00:37.876 *******
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": []}, "changed": false}
TASK [container-engine/docker : add global searchdomains] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.155) 0:00:38.031 *******
ok: [monstrinho] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false}
TASK [container-engine/docker : check system nameservers] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.161) 0:00:38.193 *******
ok: [monstrinho] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002388", "end": "2019-01-29 13:10:20.661013", "rc": 0, "start": "2019-01-29 13:10:20.658625", "stderr": "", "stderr_lines": [], "stdout": "127.0.0.53", "stdout_lines": ["127.0.0.53"]}
TASK [container-engine/docker : check system search domains] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.490) 0:00:38.683 *******
ok: [monstrinho] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002721", "end": "2019-01-29 13:10:21.197289", "rc": 0, "start": "2019-01-29 13:10:21.194568", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [container-engine/docker : add system nameservers to docker options] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.448) 0:00:39.131 *******
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": ["127.0.0.53"]}, "changed": false}
TASK [container-engine/docker : add system search domains to docker options] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.318) 0:00:39.450 *******
TASK [container-engine/docker : check number of nameservers] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.070) 0:00:39.521 *******
TASK [container-engine/docker : rtrim number of nameservers to 3] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.087) 0:00:39.609 *******
TASK [container-engine/docker : check number of search domains] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.092) 0:00:39.701 *******
TASK [container-engine/docker : check length of search domains] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.090) 0:00:39.792 *******
TASK [container-engine/docker : check for minimum kernel version] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:21 -0200 (0:00:00.084) 0:00:39.877 *******
TASK [container-engine/docker : Ensure old versions of Docker are not installed. | Debian] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:21 -0200 (0:00:00.068) 0:00:39.945 *******
ok: [monstrinho] => (item=docker) => {"changed": false, "item": "docker"}
ok: [monstrinho] => (item=docker-engine) => {"changed": false, "item": "docker-engine"}
ok: [monstrinho] => (item=docker.io) => {"changed": false, "item": "docker.io"}
TASK [container-engine/docker : Ensure old versions of Docker are not installed. | RedHat] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:23 -0200 (0:00:02.260) 0:00:42.205 *******
TASK [container-engine/docker : ensure docker-ce repository public key is installed] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:23 -0200 (0:00:00.399) 0:00:42.604 *******
ok: [monstrinho] => (item=9DC858229FC7DD38854AE2D88D81803C0EBFCD88) => {"attempts": 1, "changed": false, "item": "9DC858229FC7DD38854AE2D88D81803C0EBFCD88"}
TASK [container-engine/docker : ensure docker-ce repository is enabled] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:24 -0200 (0:00:00.744) 0:00:43.349 *******
ok: [monstrinho] => (item=deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable
) => {"changed": false, "item": "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable\n", "repo": "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable\n", "state": "present"}
TASK [container-engine/docker : ensure docker-engine repository public key is installed] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.796) 0:00:44.145 *******
TASK [container-engine/docker : ensure docker-engine repository is enabled] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.092) 0:00:44.238 *******
TASK [container-engine/docker : Configure docker repository on Fedora] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.098) 0:00:44.337 *******
TASK [container-engine/docker : Configure docker repository on RedHat/CentOS] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.068) 0:00:44.405 *******
TASK [container-engine/docker : Copy yum.conf for editing] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.073) 0:00:44.478 *******
TASK [container-engine/docker : Edit copy of yum.conf to set obsoletes=0] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.078) 0:00:44.557 *******
TASK [container-engine/docker : ensure docker packages are installed] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.067) 0:00:44.625 *******
ok: [monstrinho] => (item={u'force': True, u'name': u'docker-ce=18.06.1~ce~3-0~ubuntu'}) => {"attempts": 1, "cache_update_time": 1548774628, "cache_updated": true, "changed": false, "item": {"force": true, "name": "docker-ce=18.06.1~ce~3-0~ubuntu"}}
TASK [container-engine/docker : Ensure docker packages are installed] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:28 -0200 (0:00:02.746) 0:00:47.371 *******
TASK [container-engine/docker : get available packages on Ubuntu] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.102) 0:00:47.474 *******
TASK [container-engine/docker : show available packages on ubuntu] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.085) 0:00:47.559 *******
TASK [container-engine/docker : Set docker pin priority to apt_preferences on Debian family] *************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.076) 0:00:47.636 *******
ok: [monstrinho] => {"changed": false, "checksum": "acd87895af22b9d6cde191838650b769441e2809", "dest": "/etc/apt/preferences.d/docker", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/apt/preferences.d/docker", "size": 58, "state": "file", "uid": 0}
TASK [container-engine/docker : ensure service is started if docker packages are already present] ********************************************************************************************************************************************
Tuesday 29 January 2019 13:10:29 -0200 (0:00:00.608) 0:00:48.244 *******
ok: [monstrinho] => {"changed": false, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:41:49 -02", "ActiveEnterTimestampMonotonic": "2592753890", "ActiveExitTimestamp": "Tue 2019-01-29 12:28:45 -02", "ActiveExitTimestampMonotonic": "1808281283", "ActiveState": "active", "After": "network.target docker.socket basic.target system.slice sysinit.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:41:48 -02", "AssertTimestampMonotonic": "2592073029", "Before": "kubelet.service multi-user.target shutdown.target etcd.service", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:41:48 -02", "ConditionTimestampMonotonic": "2592073029", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "DelegateControllers": "cpu cpuacct io blkio memory devices pids", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "DynamicUser": "no", "Environment": "[unprintable] GOTRACEBACK=crash [unprintable] [unprintable]", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "17310", "ExecMainStartTimestamp": "Tue 2019-01-29 12:41:48 -02", "ExecMainStartTimestampMonotonic": "2592073894", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:38:46 -02", "InactiveEnterTimestampMonotonic": "2410133250", "InactiveExitTimestamp": "Tue 2019-01-29 12:41:48 -02", "InactiveExitTimestampMonotonic": "2592073929", "InvocationID": "4ab310c4adb748789373d6d2bb8bfdfb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "process", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "17310", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "system.slice sysinit.target", "Restart": "on-failure", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitIntervalUSec": "1min", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:41:49 -02", "StateChangeTimestampMonotonic": "2592753890", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "10", "TasksMax": "infinity", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:41:49 -02", "WatchdogTimestampMonotonic": "2592753886", "WatchdogUSec": "0"}}
[WARNING]: flush_handlers task does not support when conditional
TASK [container-engine/docker : set fact for docker_version] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:29 -0200 (0:00:00.561) 0:00:48.806 *******
ok: [monstrinho] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.043669", "end": "2019-01-29 13:10:31.540195", "rc": 0, "start": "2019-01-29 13:10:31.496526", "stderr": "", "stderr_lines": [], "stdout": "18.06.1-ce", "stdout_lines": ["18.06.1-ce"]}
TASK [container-engine/docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] ***********************************************************************************
Tuesday 29 January 2019 13:10:30 -0200 (0:00:00.781) 0:00:49.588 *******
TASK [container-engine/docker : Create docker service systemd directory if it doesn't exist] *************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:30 -0200 (0:00:00.075) 0:00:49.663 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4, "state": "directory", "uid": 0}
TASK [container-engine/docker : Write docker proxy drop-in] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:31 -0200 (0:00:00.534) 0:00:50.198 *******
TASK [container-engine/docker : get systemd version] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:31 -0200 (0:00:00.077) 0:00:50.275 *******
ok: [monstrinho] => {"changed": false, "cmd": "systemctl --version | head -n 1 | cut -d \" \" -f 2", "delta": "0:00:00.003423", "end": "2019-01-29 13:10:32.875497", "rc": 0, "start": "2019-01-29 13:10:32.872074", "stderr": "", "stderr_lines": [], "stdout": "237", "stdout_lines": ["237"]}
TASK [container-engine/docker : Write docker.service systemd file] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:32 -0200 (0:00:00.601) 0:00:50.877 *******
ok: [monstrinho] => {"changed": false, "checksum": "828d939fd2bd760bf0dd161afbc331320a68673d", "dest": "/etc/systemd/system/docker.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 751, "state": "file", "uid": 0}
TASK [container-engine/docker : Write docker options systemd drop-in] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:33 -0200 (0:00:01.455) 0:00:52.332 *******
ok: [monstrinho] => {"changed": false, "checksum": "75b0d34cd7c8ea384a129e671a67554d1078b48a", "dest": "/etc/systemd/system/docker.service.d/docker-options.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 127, "state": "file", "uid": 0}
TASK [container-engine/docker : Write docker dns systemd drop-in] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.599) 0:00:52.931 *******
ok: [monstrinho] => {"changed": false, "checksum": "692ffdda1bb6fb69d93563dd17d083c9948c7e71", "dest": "/etc/systemd/system/docker.service.d/docker-dns.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 212, "state": "file", "uid": 0}
TASK [container-engine/docker : Copy docker orphan clean up script to the node] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.677) 0:00:53.609 *******
TASK [container-engine/docker : Write docker orphan clean up systemd drop-in] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.108) 0:00:53.718 *******
TASK [container-engine/docker : ensure docker service is started and enabled] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.092) 0:00:53.811 *******
ok: [monstrinho] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:41:49 -02", "ActiveEnterTimestampMonotonic": "2592753890", "ActiveExitTimestamp": "Tue 2019-01-29 12:28:45 -02", "ActiveExitTimestampMonotonic": "1808281283", "ActiveState": "active", "After": "network.target docker.socket basic.target system.slice sysinit.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:41:48 -02", "AssertTimestampMonotonic": "2592073029", "Before": "kubelet.service multi-user.target shutdown.target etcd.service", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:41:48 -02", "ConditionTimestampMonotonic": "2592073029", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "DelegateControllers": "cpu cpuacct io blkio memory devices pids", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "DynamicUser": "no", "Environment": "[unprintable] GOTRACEBACK=crash [unprintable] [unprintable]", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "17310", "ExecMainStartTimestamp": "Tue 2019-01-29 12:41:48 -02", "ExecMainStartTimestampMonotonic": "2592073894", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:38:46 -02", "InactiveEnterTimestampMonotonic": "2410133250", "InactiveExitTimestamp": "Tue 2019-01-29 12:41:48 -02", "InactiveExitTimestampMonotonic": "2592073929", "InvocationID": "4ab310c4adb748789373d6d2bb8bfdfb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "process", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "17310", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "system.slice sysinit.target", "Restart": "on-failure", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitIntervalUSec": "1min", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:41:49 -02", "StateChangeTimestampMonotonic": "2592753890", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "10", "TasksMax": "infinity", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:41:49 -02", "WatchdogTimestampMonotonic": "2592753886", "WatchdogUSec": "0"}}
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.406) 0:00:54.217 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_prep.yml for monstrinho
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.099) 0:00:54.316 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : container_download | Create dest directory for saved/loaded container images] ***********************************************************************************************************************************************
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.502) 0:00:54.819 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases/containers", "size": 40, "state": "directory", "uid": 30033}
TASK [download : container_download | create local directory for saved/loaded container images] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:10:36 -0200 (0:00:00.451) 0:00:55.271 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:36 -0200 (0:00:00.083) 0:00:55.354 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'dnsautoscaler', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/cluster-proportional-autoscaler-amd64', u'tag': u'1.3.0', u'groups': [u'kube-node'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'pod_infra', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/pause-amd64', u'tag': u'3.1', u'groups': [u'k8s-cluster'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'etcd', 'value': {u'unarchive': True, u'container': True, u'groups': [u'etcd'], u'dest': u'/tmp/releases/etcd-v3.2.24-linux-amd64.tar.gz', u'version': u'v3.2.24', u'enabled': True, u'repo': u'quay.io/coreos/etcd', u'url': u'https://github.com/coreos/etcd/releases/download/v3.2.24/etcd-v3.2.24-linux-amd64.tar.gz', u'tag': u'v3.2.24', u'mode': u'0755', u'file': False, u'owner': u'root', u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'kubeadm', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/kubeadm', u'enabled': True, u'url': u'https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm', u'version': u'v1.13.2', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'7cb0ce57c1e6e2d85e05de3780a2f35a191fe93f89cfc5816b424efcf39834b9'}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'hyperkube_file', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/hyperkube', u'enabled': True, u'url': u'https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube', u'version': u'v1.13.2', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'f159b587ec80ad03bf3b9bb09de5d64b773d01b0e34f2a4f1c816879c56aae6d'}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'nginx', 'value': {u'container': True, u'enabled': True, u'repo': u'nginx', u'tag': 1.13, u'groups': [u'kube-node'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'dashboard', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/kubernetes-dashboard-amd64', u'tag': u'v1.10.1', u'groups': [u'kube-master'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_policy', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/kube-controllers', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calicoctl', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/ctl', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'cni', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/cni-plugins-amd64-v0.6.0.tgz', u'enabled': True, u'url': u'https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz', u'version': u'v0.6.0', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'f04339a21b8edf76d415e7f17b620e63b8f37a76b2f706671587ab6464411f2d'}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_node', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/node', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'coredns', 'value': {u'container': True, u'enabled': True, u'repo': u'coredns/coredns', u'tag': u'1.2.6', u'groups': [u'kube-node'], u'sha256': u''}})
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_cni', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/cni', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}})
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:37 -0200 (0:00:01.456) 0:00:56.810 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.181) 0:00:56.992 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.180) 0:00:57.173 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.3.0"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.169) 0:00:57.343 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.394) 0:00:57.738 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.170) 0:00:57.908 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.092) 0:00:58.001 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.056) 0:00:58.057 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.118) 0:00:58.176 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.171) 0:00:58.348 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.192) 0:00:58.541 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.1"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.181) 0:00:58.722 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.418) 0:00:59.140 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": true}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.197) 0:00:59.338 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.093) 0:00:59.432 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.054) 0:00:59.487 *******
changed: [monstrinho] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "pull", "gcr.io/google_containers/pause-amd64:3.1"], "delta": "0:00:03.586579", "end": "2019-01-29 13:10:45.466574", "rc": 0, "start": "2019-01-29 13:10:41.879995", "stderr": "", "stderr_lines": [], "stdout": "3.1: Pulling from google_containers/pause-amd64\nDigest: sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610\nStatus: Image is up to date for gcr.io/google_containers/pause-amd64:3.1", "stdout_lines": ["3.1: Pulling from google_containers/pause-amd64", "Digest: sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610", "Status: Image is up to date for gcr.io/google_containers/pause-amd64:3.1"]}
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:44 -0200 (0:00:03.940) 0:01:03.427 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:44 -0200 (0:00:00.197) 0:01:03.625 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:44 -0200 (0:00:00.176) 0:01:03.801 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.24"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.157) 0:01:03.959 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.541) 0:01:04.500 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.181) 0:01:04.681 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.090) 0:01:04.772 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.060) 0:01:04.833 *******
TASK [download : file_download | Downloading...] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.082) 0:01:04.915 *******
ok: [monstrinho] => {
"msg": [
"URL: https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm",
"Dest: /tmp/releases/kubeadm"
]
}
TASK [download : file_download | Create dest directory] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.176) 0:01:05.092 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033}
TASK [download : file_download | Download item] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.367) 0:01:05.459 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/kubeadm", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 36407392, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm"}
TASK [download : file_download | Extract archives] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.958) 0:01:06.418 *******
TASK [download : file_download | Downloading...] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.083) 0:01:06.502 *******
ok: [monstrinho] => {
"msg": [
"URL: https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube",
"Dest: /tmp/releases/hyperkube"
]
}
TASK [download : file_download | Create dest directory] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.189) 0:01:06.691 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033}
TASK [download : file_download | Download item] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:48 -0200 (0:00:00.310) 0:01:07.001 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/hyperkube", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 177749912, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube"}
TASK [download : file_download | Extract archives] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.931) 0:01:07.933 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.120) 0:01:08.054 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.177) 0:01:08.231 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.175) 0:01:08.406 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.164) 0:01:08.571 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.451) 0:01:09.023 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.197) 0:01:09.221 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.123) 0:01:09.345 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.066) 0:01:09.411 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.121) 0:01:09.533 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.175) 0:01:09.708 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.203) 0:01:09.911 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/kubernetes-dashboard-amd64:v1.10.1"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.177) 0:01:10.089 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.395) 0:01:10.485 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.301) 0:01:10.787 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.103) 0:01:10.890 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.092) 0:01:10.983 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.111) 0:01:11.094 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.156) 0:01:11.250 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.295) 0:01:11.545 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/kube-controllers:v3.1.3"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.282) 0:01:11.828 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.476) 0:01:12.304 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.194) 0:01:12.499 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.099) 0:01:12.599 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.070) 0:01:12.669 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.118) 0:01:12.787 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.165) 0:01:12.953 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.174) 0:01:13.127 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v3.1.3"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.155) 0:01:13.283 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.570) 0:01:13.854 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.320) 0:01:14.174 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.101) 0:01:14.276 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.071) 0:01:14.347 *******
TASK [download : file_download | Downloading...] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.106) 0:01:14.454 *******
ok: [monstrinho] => {
"msg": [
"URL: https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz",
"Dest: /tmp/releases/cni-plugins-amd64-v0.6.0.tgz"
]
}
TASK [download : file_download | Create dest directory] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.168) 0:01:14.623 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033}
TASK [download : file_download | Download item] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.398) 0:01:15.021 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 15385105, "state": "file", "uid": 0, "url": "https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz"}
TASK [download : file_download | Extract archives] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.607) 0:01:15.629 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.122) 0:01:15.752 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.156) 0:01:15.909 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.294) 0:01:16.203 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v3.1.3"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.274) 0:01:16.478 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.691) 0:01:17.170 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.295) 0:01:17.465 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.089) 0:01:17.555 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.054) 0:01:17.610 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.115) 0:01:17.725 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.155) 0:01:17.881 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.288) 0:01:18.170 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "coredns/coredns:1.2.6"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.273) 0:01:18.443 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.745) 0:01:19.189 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.310) 0:01:19.500 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.087) 0:01:19.587 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.058) 0:01:19.646 *******
TASK [download : container_download | Make download decision if pull is required by tag or sha256] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.116) 0:01:19.762 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.235) 0:01:19.997 *******
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.166) 0:01:20.164 *******
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v3.1.3"}, "changed": false}
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.170) 0:01:20.334 *******
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false}
TASK [download : set_fact] *******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.391) 0:01:20.725 *******
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false}
TASK [download : Check the local digest sha256 corresponds to the given image tag] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.179) 0:01:20.905 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] *****************************************************************************************************************************
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.109) 0:01:21.014 *******
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] ****************************************************************************************************************************
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.056) 0:01:21.071 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.089) 0:01:21.160 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.718) 0:01:21.879 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/kubeadm_images.yml for monstrinho
TASK [download : kubeadm | Create kubeadm config] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.110) 0:01:21.990 *******
ok: [monstrinho] => {"changed": false, "checksum": "a8ce35abe6277befb5bacf96f55aca24fa1bcf55", "dest": "/etc/kubernetes/kubeadm-images.yaml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubeadm-images.yaml", "size": 250, "state": "file", "uid": 0}
TASK [download : container_download | download images for kubeadm config images] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.501) 0:01:22.491 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/tmp/releases/kubeadm", "config", "images", "pull", "--config=/etc/kubernetes/kubeadm-images.yaml"], "delta": "0:00:34.123483", "end": "2019-01-29 13:11:38.944545", "rc": 0, "start": "2019-01-29 13:11:04.821062", "stderr": "", "stderr_lines": [], "stdout": "[config/images] Pulled gcr.io/google-containers/kube-apiserver:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-controller-manager:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-scheduler:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-proxy:v1.13.2\n[config/images] Pulled gcr.io/google-containers/pause:3.1\n[config/images] Pulled gcr.io/google-containers/etcd:3.2.24\n[config/images] Pulled gcr.io/google-containers/coredns:1.2.6", "stdout_lines": ["[config/images] Pulled gcr.io/google-containers/kube-apiserver:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-controller-manager:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-scheduler:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-proxy:v1.13.2", "[config/images] Pulled gcr.io/google-containers/pause:3.1", "[config/images] Pulled gcr.io/google-containers/etcd:3.2.24", "[config/images] Pulled gcr.io/google-containers/coredns:1.2.6"]}
PLAY [etcd] **********************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:38 -0200 (0:00:34.410) 0:01:56.902 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:38 -0200 (0:00:00.057) 0:01:56.960 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:38 -0200 (0:00:00.531) 0:01:57.492 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.520) 0:01:58.013 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.052) 0:01:58.066 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.125) 0:01:58.191 *******
ok: [monstrinho] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
TASK [adduser : User | Create User] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.448) 0:01:58.640 *******
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
TASK [etcd : set_fact] ***********************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.337) 0:01:58.978 *******
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false}
TASK [etcd : ansible_architecture_rename] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.126) 0:01:59.104 *******
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.131) 0:01:59.235 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/check_certs.yml for monstrinho
TASK [etcd : Check_certs | check if all certs have already been generated on first master] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.116) 0:01:59.351 *******
ok: [monstrinho -> None] => {"changed": false, "examined": 8, "files": [{"atime": 1548773301.5338123, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548773290.621881, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "e590f0516331d7b58adb60882dc73e278ff2aa67", "ctime": 1548773290.7298803, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201532, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0546799, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1371, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548773290.8538795, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 3, "msg": ""}
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] *******************************************************************************************************************************
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.668) 0:02:00.019 *******
ok: [monstrinho] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
TASK [etcd : Check certs | check if a cert already exists on node] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.127) 0:02:00.147 *******
ok: [monstrinho] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1548773301.5338123, "attr_flags": "", "attributes": [], "block_size": 1536, "blocks": 9, "charset": "us-ascii", "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548773290.621881, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [monstrinho] => (item=node-monstrinho-key.pem) => {"changed": false, "item": "node-monstrinho-key.pem", "stat": {"atime": 1548773301.5338123, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548773290.8538795, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [etcd : Check_certs | Set 'gen_certs' to true] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.692) 0:02:00.839 *******
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.072) 0:02:00.912 *******
ok: [monstrinho] => {"ansible_facts": {"gen_node_certs": {"monstrinho": false}}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.139) 0:02:01.052 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.067) 0:02:01.119 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/gen_certs_script.yml for monstrinho
TASK [etcd : Gen_certs | create etcd cert dir] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.109) 0:02:01.229 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | create etcd script dir (on monstrinho)] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.400) 0:02:01.630 *******
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 3, "state": "directory", "uid": 0}
TASK [etcd : Gen_certs | create etcd cert dir (on monstrinho)] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.295) 0:02:01.925 *******
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | write openssl config] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.299) 0:02:02.225 *******
TASK [etcd : Gen_certs | copy certs generation script] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.078) 0:02:02.303 *******
TASK [etcd : Gen_certs | run cert generation script] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.075) 0:02:02.379 *******
TASK [etcd : Gen_certs | Gather etcd master certs] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.098) 0:02:02.478 *******
TASK [etcd : Gen_certs | Write etcd master certs] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.119) 0:02:02.597 *******
TASK [etcd : set_fact] ***********************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.124) 0:02:02.722 *******
ok: [monstrinho] => {"ansible_facts": {"my_etcd_node_certs": ["ca.pem", "node-monstrinho.pem", "node-monstrinho-key.pem"]}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true on nodes] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.124) 0:02:02.847 *******
TASK [etcd : Gen_certs | Gather node certs] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.098) 0:02:02.945 *******
TASK [etcd : Gen_certs | Copy certs on nodes] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.053) 0:02:02.998 *******
TASK [etcd : Gen_certs | check certificate permissions] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.053) 0:02:03.052 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.258) 0:02:03.311 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/upd_ca_trust.yml for monstrinho
TASK [etcd : Gen_certs | target ca-certificate store file] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.101) 0:02:03.412 *******
ok: [monstrinho] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
TASK [etcd : Gen_certs | add CA to trusted CA dir] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.134) 0:02:03.546 *******
ok: [monstrinho] => {"changed": false, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "14613aede44b0876f06006de7aed68f5", "mode": "0644", "owner": "root", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.555) 0:02:04.102 *******
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.059) 0:02:04.162 *******
TASK [etcd : Gen_certs | update ca-certificates (ClearLinux)] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.057) 0:02:04.219 *******
TASK [etcd : Gen_certs | Get etcd certificate serials] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.054) 0:02:04.274 *******
ok: [monstrinho] => {"changed": false, "cmd": ["openssl", "x509", "-in", "/etc/ssl/etcd/ssl/node-monstrinho.pem", "-noout", "-serial"], "delta": "0:00:00.003531", "end": "2019-01-29 13:11:46.637935", "rc": 0, "start": "2019-01-29 13:11:46.634404", "stderr": "", "stderr_lines": [], "stdout": "serial=ED526DC0615FFF3B", "stdout_lines": ["serial=ED526DC0615FFF3B"]}
TASK [etcd : Set etcd_client_cert_serial] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.286) 0:02:04.560 *******
ok: [monstrinho] => {"ansible_facts": {"etcd_client_cert_serial": "ED526DC0615FFF3B"}, "changed": false}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.144) 0:02:04.704 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/install_docker.yml for monstrinho
TASK [etcd : Install | Copy etcdctl binary from docker container] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.096) 0:02:04.800 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.24 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.916520", "end": "2019-01-29 13:11:48.067129", "rc": 0, "start": "2019-01-29 13:11:47.150609", "stderr": "Error: No such container: etcdctl-binarycopy", "stderr_lines": ["Error: No such container: etcdctl-binarycopy"], "stdout": "49a6e4db9ad4faefcb0e71077894753b3945593b43a25009c624028dbf8fea5a\netcdctl-binarycopy", "stdout_lines": ["49a6e4db9ad4faefcb0e71077894753b3945593b43a25009c624028dbf8fea5a", "etcdctl-binarycopy"]}
TASK [etcd : Install etcd launch script] *****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:47 -0200 (0:00:01.210) 0:02:06.010 *******
ok: [monstrinho] => {"changed": false, "checksum": "d9ff177a4c496629c590ce07b1c27aa61d7566a4", "dest": "/usr/local/bin/etcd", "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/usr/local/bin/etcd", "size": 348, "state": "file", "uid": 0}
TASK [etcd : Install etcd-events launch script] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.496) 0:02:06.507 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.054) 0:02:06.561 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/configure.yml for monstrinho
TASK [etcd : Configure | Check if etcd cluster is healthy] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.129) 0:02:06.691 *******
ok: [monstrinho] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.0.1.2:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.028444", "end": "2019-01-29 13:11:49.105860", "rc": 0, "start": "2019-01-29 13:11:49.077416", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Check if etcd-events cluster is healthy] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.337) 0:02:07.029 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.060) 0:02:07.089 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.086) 0:02:07.176 *******
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0}
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.660) 0:02:07.836 *******
TASK [etcd : Configure | Copy etcd.service systemd file] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.061) 0:02:07.898 *******
ok: [monstrinho] => {"changed": false, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "dest": "/etc/systemd/system/etcd.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/etcd.service", "size": 354, "state": "file", "uid": 0}
TASK [etcd : Configure | Copy etcd-events.service systemd file] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.465) 0:02:08.363 *******
TASK [etcd : Configure | reload systemd] *****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.068) 0:02:08.432 *******
changed: [monstrinho] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.215429", "end": "2019-01-29 13:11:51.034996", "rc": 0, "start": "2019-01-29 13:11:50.819567", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Ensure etcd is running] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.538) 0:02:08.971 *******
ok: [monstrinho] => {"changed": false, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:46:27 -02", "ActiveEnterTimestampMonotonic": "2870195592", "ActiveExitTimestamp": "Tue 2019-01-29 12:46:25 -02", "ActiveExitTimestampMonotonic": "2868351409", "ActiveState": "active", "After": "docker.service systemd-journald.socket sysinit.target system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:46:26 -02", "AssertTimestampMonotonic": "2870028779", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:46:26 -02", "ConditionTimestampMonotonic": "2870028778", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "DynamicUser": "no", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "29685", "ExecMainStartTimestamp": "Tue 2019-01-29 12:46:27 -02", "ExecMainStartTimestampMonotonic": "2870195492", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GID": "0", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:46:26 -02", "InactiveEnterTimestampMonotonic": "2870026830", "InactiveExitTimestamp": "Tue 2019-01-29 12:46:26 -02", "InactiveExitTimestampMonotonic": "2870031500", "InvocationID": "729133dab4db4143b1320b3208e1a169", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "30478", "LimitNPROCSoft": "30478", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "29685", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice", "Restart": "always", "RestartUSec": "15s", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:46:27 -02", "StateChangeTimestampMonotonic": "2870197198", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "12", "TasksMax": "4915", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UID": "0", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:46:27 -02", "WatchdogTimestampMonotonic": "2870195590", "WatchdogUSec": "0"}}
TASK [etcd : Configure | Ensure etcd-events is running] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.436) 0:02:09.408 *******
TASK [etcd : Configure | Check if etcd cluster is healthy] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.058) 0:02:09.467 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.0.1.2:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.024828", "end": "2019-01-29 13:11:51.918986", "rc": 0, "start": "2019-01-29 13:11:51.894158", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Check if etcd-events cluster is healthy] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.378) 0:02:09.845 *******
TASK [etcd : Configure | Check if member is in etcd cluster] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.069) 0:02:09.915 *******
ok: [monstrinho] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.0.1.2:2379 member list | grep -q 10.0.1.2", "delta": "0:00:00.016063", "end": "2019-01-29 13:11:52.351182", "rc": 0, "start": "2019-01-29 13:11:52.335119", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Check if member is in etcd-events cluster] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.360) 0:02:10.275 *******
TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.067) 0:02:10.343 *******
TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.069) 0:02:10.413 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.063) 0:02:10.477 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.106) 0:02:10.583 *******
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0}
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.772) 0:02:11.356 *******
TASK [etcd : Restart etcd if certs changed] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.067) 0:02:11.423 *******
TASK [etcd : Restart etcd-events if certs changed] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.070) 0:02:11.494 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.062) 0:02:11.556 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.093) 0:02:11.649 *******
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0}
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:53 -0200 (0:00:01.170) 0:02:12.820 *******
PLAY [k8s-cluster:calico-rr] *****************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.079) 0:02:12.899 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.056) 0:02:12.956 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.522) 0:02:13.478 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.635) 0:02:14.114 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.053) 0:02:14.167 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [adduser : User | Create User Group] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.249) 0:02:14.417 *******
ok: [monstrinho] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true}
TASK [adduser : User | Create User] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.500) 0:02:14.917 *******
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998}
TASK [etcd : set_fact] ***********************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.413) 0:02:15.330 *******
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false}
TASK [etcd : ansible_architecture_rename] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.246) 0:02:15.577 *******
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.246) 0:02:15.824 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/check_certs.yml for monstrinho
TASK [etcd : Check_certs | check if all certs have already been generated on first master] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.103) 0:02:15.928 *******
ok: [monstrinho -> None] => {"changed": false, "examined": 8, "files": [{"atime": 1548774706.167716, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548774706.6357317, "checksum": "e590f0516331d7b58adb60882dc73e278ff2aa67", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201532, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0546799, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1371, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 3, "msg": ""}
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] *******************************************************************************************************************************
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.391) 0:02:16.319 *******
ok: [monstrinho] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false}
TASK [etcd : Check certs | check if a cert already exists on node] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.258) 0:02:16.577 *******
ok: [monstrinho] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1548774706.167716, "attr_flags": "", "attributes": [], "block_size": 1536, "blocks": 9, "charset": "us-ascii", "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548774705.3836899, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
ok: [monstrinho] => (item=node-monstrinho-key.pem) => {"changed": false, "item": "node-monstrinho-key.pem", "stat": {"atime": 1548774718.3921177, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548774705.3836899, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [etcd : Check_certs | Set 'gen_certs' to true] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.496) 0:02:17.074 *******
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.073) 0:02:17.148 *******
ok: [monstrinho] => {"ansible_facts": {"gen_node_certs": {"monstrinho": false}}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.262) 0:02:17.410 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.069) 0:02:17.479 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/gen_certs_script.yml for monstrinho
TASK [etcd : Gen_certs | create etcd cert dir] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.289) 0:02:17.768 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | create etcd script dir (on monstrinho)] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.265) 0:02:18.034 *******
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 3, "state": "directory", "uid": 0}
TASK [etcd : Gen_certs | create etcd cert dir (on monstrinho)] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.290) 0:02:18.325 *******
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : Gen_certs | write openssl config] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.274) 0:02:18.600 *******
TASK [etcd : Gen_certs | copy certs generation script] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.076) 0:02:18.677 *******
TASK [etcd : Gen_certs | run cert generation script] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.075) 0:02:18.753 *******
TASK [etcd : Gen_certs | Gather etcd master certs] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.092) 0:02:18.845 *******
TASK [etcd : Gen_certs | Write etcd master certs] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.134) 0:02:18.980 *******
TASK [etcd : set_fact] ***********************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.138) 0:02:19.119 *******
ok: [monstrinho] => {"ansible_facts": {"my_etcd_node_certs": ["ca.pem", "node-monstrinho.pem", "node-monstrinho-key.pem"]}, "changed": false}
TASK [etcd : Check_certs | Set 'sync_certs' to true on nodes] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.130) 0:02:19.250 *******
TASK [etcd : Gen_certs | Gather node certs] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.106) 0:02:19.356 *******
TASK [etcd : Gen_certs | Copy certs on nodes] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.057) 0:02:19.413 *******
TASK [etcd : Gen_certs | check certificate permissions] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.063) 0:02:19.477 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.309) 0:02:19.787 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/upd_ca_trust.yml for monstrinho
TASK [etcd : Gen_certs | target ca-certificate store file] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.118) 0:02:19.905 *******
ok: [monstrinho] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false}
TASK [etcd : Gen_certs | add CA to trusted CA dir] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.161) 0:02:20.067 *******
ok: [monstrinho] => {"changed": false, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "14613aede44b0876f06006de7aed68f5", "mode": "0644", "owner": "root", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0}
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.336) 0:02:20.403 *******
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.058) 0:02:20.462 *******
TASK [etcd : Gen_certs | update ca-certificates (ClearLinux)] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.060) 0:02:20.522 *******
TASK [etcd : Gen_certs | Get etcd certificate serials] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.060) 0:02:20.583 *******
ok: [monstrinho] => {"changed": false, "cmd": ["openssl", "x509", "-in", "/etc/ssl/etcd/ssl/node-monstrinho.pem", "-noout", "-serial"], "delta": "0:00:00.003418", "end": "2019-01-29 13:12:02.936531", "rc": 0, "start": "2019-01-29 13:12:02.933113", "stderr": "", "stderr_lines": [], "stdout": "serial=ED526DC0615FFF3B", "stdout_lines": ["serial=ED526DC0615FFF3B"]}
TASK [etcd : Set etcd_client_cert_serial] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.276) 0:02:20.860 *******
ok: [monstrinho] => {"ansible_facts": {"etcd_client_cert_serial": "ED526DC0615FFF3B"}, "changed": false}
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.158) 0:02:21.018 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/install_docker.yml for monstrinho
TASK [etcd : Install | Copy etcdctl binary from docker container] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.098) 0:02:21.117 *******
TASK [etcd : Install etcd launch script] *****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.058) 0:02:21.176 *******
TASK [etcd : Install etcd-events launch script] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.058) 0:02:21.234 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.059) 0:02:21.294 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/configure.yml for monstrinho
TASK [etcd : Configure | Check if etcd cluster is healthy] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.116) 0:02:21.410 *******
TASK [etcd : Configure | Check if etcd-events cluster is healthy] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.070) 0:02:21.480 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.067) 0:02:21.548 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.103) 0:02:21.651 *******
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.068) 0:02:21.720 *******
TASK [etcd : Configure | Copy etcd.service systemd file] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.063) 0:02:21.784 *******
TASK [etcd : Configure | Copy etcd-events.service systemd file] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.069) 0:02:21.853 *******
TASK [etcd : Configure | reload systemd] *****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.062) 0:02:21.916 *******
changed: [monstrinho] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.179003", "end": "2019-01-29 13:12:04.415675", "rc": 0, "start": "2019-01-29 13:12:04.236672", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [etcd : Configure | Ensure etcd is running] *********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.424) 0:02:22.341 *******
TASK [etcd : Configure | Ensure etcd-events is running] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.081) 0:02:22.423 *******
TASK [etcd : Configure | Check if etcd cluster is healthy] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.066) 0:02:22.489 *******
TASK [etcd : Configure | Check if etcd-events cluster is healthy] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.074) 0:02:22.564 *******
TASK [etcd : Configure | Check if member is in etcd cluster] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.067) 0:02:22.631 *******
TASK [etcd : Configure | Check if member is in etcd-events cluster] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.070) 0:02:22.702 *******
TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.069) 0:02:22.771 *******
TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.075) 0:02:22.847 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.074) 0:02:22.921 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.090) 0:02:23.012 *******
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.071) 0:02:23.084 *******
TASK [etcd : Restart etcd if certs changed] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.058) 0:02:23.143 *******
TASK [etcd : Restart etcd-events if certs changed] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.060) 0:02:23.203 *******
TASK [etcd : include_tasks] ******************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.060) 0:02:23.263 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho
TASK [etcd : Refresh config | Create etcd config file] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.105) 0:02:23.369 *******
TASK [etcd : Refresh config | Create etcd-events config file] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.067) 0:02:23.437 *******
PLAY [k8s-cluster] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.095) 0:02:23.532 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.067) 0:02:23.600 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.562) 0:02:24.163 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.639) 0:02:24.803 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.055) 0:02:24.858 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes/node : look up docker cgroup driver] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.142) 0:02:25.000 *******
ok: [monstrinho] => {"changed": false, "cmd": "docker info | grep 'Cgroup Driver' | awk -F': ' '{ print $2; }'", "delta": "0:00:00.078746", "end": "2019-01-29 13:12:07.415987", "rc": 0, "start": "2019-01-29 13:12:07.337241", "stderr": "WARNING: No swap limit support", "stderr_lines": ["WARNING: No swap limit support"], "stdout": "cgroupfs", "stdout_lines": ["cgroupfs"]}
TASK [kubernetes/node : set_fact] ************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.350) 0:02:25.351 *******
ok: [monstrinho] => {"ansible_facts": {"kubelet_cgroup_driver_detected": "cgroupfs", "standalone_kubelet": false}, "changed": false}
TASK [kubernetes/node : os specific vars] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.139) 0:02:25.490 *******
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml) => {"ansible_facts": {"kube_resolv_conf": "/run/systemd/resolve/resolv.conf"}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml"}
TASK [kubernetes/node : Pre-upgrade | check if kubelet container exists] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.156) 0:02:25.646 *******
ok: [monstrinho] => {"changed": false, "cmd": "docker ps -af name=kubelet | grep kubelet", "delta": "0:00:00.044863", "end": "2019-01-29 13:12:08.027410", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:12:07.982547", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [kubernetes/node : Pre-upgrade | copy /var/lib/cni from kubelet] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.436) 0:02:26.083 *******
TASK [kubernetes/node : Pre-upgrade | ensure kubelet container service is stopped if using host deployment] **********************************************************************************************************************************
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.064) 0:02:26.148 *******
TASK [kubernetes/node : Pre-upgrade | ensure kubelet container is removed if using host deployment] ******************************************************************************************************************************************
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.053) 0:02:26.201 *******
TASK [kubernetes/node : Ensure /var/lib/cni exists] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.050) 0:02:26.252 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/lib/cni", "size": 2, "state": "directory", "uid": 0}
TASK [kubernetes/node : install | Copy kubeadm binary from download dir] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.461) 0:02:26.713 *******
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/kubeadm /usr/local/bin/kubeadm", "msg": "", "rc": 0, "stdout_lines": []}
TASK [kubernetes/node : install | Set kubeadm binary permissions] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:08 -0200 (0:00:00.656) 0:02:27.369 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubeadm", "size": 36407392, "state": "file", "uid": 0}
TASK [kubernetes/node : install | Copy kubelet binary from download dir] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:08 -0200 (0:00:00.302) 0:02:27.672 *******
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/hyperkube /usr/local/bin/kubelet", "msg": "", "rc": 0, "stdout_lines": []}
TASK [kubernetes/node : install | Set kubelet binary permissions] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.429) 0:02:28.101 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubelet", "size": 177749912, "state": "file", "uid": 0}
TASK [kubernetes/node : install | Copy socat wrapper for Container Linux] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.360) 0:02:28.461 *******
TASK [kubernetes/node : install | Write kubelet systemd init file] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.051) 0:02:28.512 *******
ok: [monstrinho] => {"changed": false, "checksum": "6776d5c1dc7ceb83b0ae25cbc09694a8a8a18f01", "dest": "/etc/systemd/system/kubelet.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/kubelet.service", "size": 644, "state": "file", "uid": 0}
TASK [kubernetes/node : nginx-proxy | Write static pod] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.667) 0:02:29.180 *******
TASK [kubernetes/node : nginx-proxy | Make nginx directory] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.059) 0:02:29.240 *******
TASK [kubernetes/node : nginx-proxy | Write nginx-proxy configuration] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.054) 0:02:29.294 *******
TASK [kubernetes/node : Make sure dynamic kubelet configuration directory is writeable] ******************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.054) 0:02:29.348 *******
TASK [kubernetes/node : Write kubelet config file (kubeadm)] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.047) 0:02:29.396 *******
ok: [monstrinho] => {"changed": false, "checksum": "e3636281c3fa1cfa88a1bf04b15e5c63b6af3133", "dest": "/etc/kubernetes/kubelet.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubelet.env", "size": 1775, "state": "file", "uid": 0}
TASK [kubernetes/node : Ensure nodePort range is reserved] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.529) 0:02:29.925 *******
ok: [monstrinho] => {"changed": false}
TASK [kubernetes/node : Verify if br_netfilter module exists] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.388) 0:02:30.313 *******
ok: [monstrinho] => {"changed": false, "cmd": "modinfo br_netfilter", "delta": "0:00:00.002164", "end": "2019-01-29 13:12:12.665070", "failed_when_result": false, "rc": 0, "start": "2019-01-29 13:12:12.662906", "stderr": "", "stderr_lines": [], "stdout": "filename: /lib/modules/4.15.0-44-generic/kernel/net/bridge/br_netfilter.ko\ndescription: Linux ethernet netfilter firewall bridge\nauthor: Bart De Schuymer <bdschuym@pandora.be>\nauthor: Lennert Buytenhek <buytenh@gnu.org>\nlicense: GPL\nsrcversion: 037C978AF8D3C061B00020A\ndepends: bridge\nretpoline: Y\nintree: Y\nname: br_netfilter\nvermagic: 4.15.0-44-generic SMP mod_unload \nsignat: PKCS#7\nsigner: \nsig_key: \nsig_hashalgo: md4", "stdout_lines": ["filename: /lib/modules/4.15.0-44-generic/kernel/net/bridge/br_netfilter.ko", "description: Linux ethernet netfilter firewall bridge", "author: Bart De Schuymer <bdschuym@pandora.be>", "author: Lennert Buytenhek <buytenh@gnu.org>", "license: GPL", "srcversion: 037C978AF8D3C061B00020A", "depends: bridge", "retpoline: Y", "intree: Y", "name: br_netfilter", "vermagic: 4.15.0-44-generic SMP mod_unload ", "signat: PKCS#7", "signer: ", "sig_key: ", "sig_hashalgo: md4"]}
TASK [kubernetes/node : Verify br_netfilter module path exists] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.302) 0:02:30.615 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/modules-load.d", "size": 6, "state": "directory", "uid": 0}
TASK [kubernetes/node : Enable br_netfilter module] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:12 -0200 (0:00:00.266) 0:02:30.882 *******
ok: [monstrinho] => {"changed": false, "name": "br_netfilter", "params": "", "state": "present"}
TASK [kubernetes/node : Persist br_netfilter module] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:12 -0200 (0:00:00.575) 0:02:31.457 *******
ok: [monstrinho] => {"changed": false, "checksum": "c3394aff3e3a3e3920e68205b8e839b3d725648e", "dest": "/etc/modules-load.d/kubespray-br_netfilter.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kubespray-br_netfilter.conf", "size": 12, "state": "file", "uid": 0}
TASK [kubernetes/node : Check if bridge-nf-call-iptables key exists] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:13 -0200 (0:00:00.491) 0:02:31.949 *******
ok: [monstrinho] => {"changed": false, "cmd": ["sysctl", "net.bridge.bridge-nf-call-iptables"], "delta": "0:00:00.001698", "end": "2019-01-29 13:12:14.402135", "failed_when_result": false, "rc": 0, "start": "2019-01-29 13:12:14.400437", "stderr": "", "stderr_lines": [], "stdout": "net.bridge.bridge-nf-call-iptables = 1", "stdout_lines": ["net.bridge.bridge-nf-call-iptables = 1"]}
TASK [kubernetes/node : Enable bridge-nf-call tables] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:13 -0200 (0:00:00.376) 0:02:32.326 *******
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-iptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-iptables"}
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-arptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-arptables"}
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-ip6tables) => {"changed": false, "item": "net.bridge.bridge-nf-call-ip6tables"}
TASK [kubernetes/node : Modprode Kernel Module for IPVS] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:14 -0200 (0:00:00.644) 0:02:32.970 *******
ok: [monstrinho] => (item=ip_vs) => {"changed": false, "item": "ip_vs", "name": "ip_vs", "params": "", "state": "present"}
ok: [monstrinho] => (item=ip_vs_rr) => {"changed": false, "item": "ip_vs_rr", "name": "ip_vs_rr", "params": "", "state": "present"}
ok: [monstrinho] => (item=ip_vs_wrr) => {"changed": false, "item": "ip_vs_wrr", "name": "ip_vs_wrr", "params": "", "state": "present"}
ok: [monstrinho] => (item=ip_vs_sh) => {"changed": false, "item": "ip_vs_sh", "name": "ip_vs_sh", "params": "", "state": "present"}
TASK [kubernetes/node : Modprobe nf_conntrack_ipv4 for kernels < 4.19] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:14 -0200 (0:00:00.739) 0:02:33.709 *******
ok: [monstrinho] => {"changed": false, "name": "nf_conntrack_ipv4", "params": "", "state": "present"}
TASK [kubernetes/node : Modprobe nf_conntrack for kernels >= 4.19] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.445) 0:02:34.155 *******
TASK [kubernetes/node : Persist ip_vs modules] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.058) 0:02:34.213 *******
ok: [monstrinho] => {"changed": false, "checksum": "fb666e350805b04493805c3b11187436eb0a0e31", "dest": "/etc/modules-load.d/kube_proxy-ipvs.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kube_proxy-ipvs.conf", "size": 52, "state": "file", "uid": 0}
TASK [kubernetes/node : Purge proxy manifest for kubeadm or if proxy services being provided by other means, e.g. network_plugin] ************************************************************************************************************
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.613) 0:02:34.827 *******
TASK [kubernetes/node : Cleanup kube-proxy leftovers from node] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:34.878 *******
TASK [kubernetes/node : include_tasks] *******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:34.928 *******
TASK [kubernetes/node : Write cacert file] ***************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.053) 0:02:34.981 *******
TASK [kubernetes/node : Write cloud-config] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.051) 0:02:35.032 *******
TASK [kubernetes/node : Enable kubelet] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:35.083 *******
ok: [monstrinho] => {"changed": false, "enabled": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:47:57 -02", "ActiveEnterTimestampMonotonic": "2961058314", "ActiveExitTimestamp": "Tue 2019-01-29 12:47:57 -02", "ActiveExitTimestampMonotonic": "2961005321", "ActiveState": "active", "After": "basic.target sysinit.target system.slice docker.service systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:47:57 -02", "AssertTimestampMonotonic": "2961053287", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:47:57 -02", "ConditionTimestampMonotonic": "2961053287", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/kubelet.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "DynamicUser": "no", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "7449", "ExecMainStartTimestamp": "Tue 2019-01-29 12:47:57 -02", "ExecMainStartTimestampMonotonic": "2961058254", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GID": "0", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:47:57 -02", "InactiveEnterTimestampMonotonic": "2961052299", "InactiveExitTimestamp": "Tue 2019-01-29 12:47:57 -02", "InactiveExitTimestampMonotonic": "2961054391", "InvocationID": "a3e803b52cc54047b011a8726dc60b77", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "30478", "LimitNPROCSoft": "30478", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "7449", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice", "Restart": "always", "RestartUSec": "10s", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:47:57 -02", "StateChangeTimestampMonotonic": "2961058314", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "24", "TasksMax": "4915", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UID": "0", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:47:57 -02", "WatchdogTimestampMonotonic": "2961058312", "WatchdogUSec": "0"}}
PLAY [kube-master] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.424) 0:02:35.508 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:35.558 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.511) 0:02:36.070 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.530) 0:02:36.601 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.050) 0:02:36.652 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes/tokens : Check_tokens | check if the tokens have already been generated on first master] ************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.258) 0:02:36.910 *******
TASK [kubernetes/tokens : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] **************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.048) 0:02:36.959 *******
TASK [kubernetes/tokens : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.047) 0:02:37.006 *******
TASK [kubernetes/tokens : Check tokens | check if a cert already exists] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.047) 0:02:37.054 *******
TASK [kubernetes/tokens : Check_tokens | Set 'sync_tokens' to true] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.056) 0:02:37.110 *******
TASK [kubernetes/tokens : Make sure the tokens directory exits] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.048) 0:02:37.158 *******
TASK [kubernetes/tokens : Gen_tokens | copy tokens generation script] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.070) 0:02:37.229 *******
TASK [kubernetes/tokens : Gen_tokens | generate tokens for master components] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.083) 0:02:37.312 *******
TASK [kubernetes/tokens : Gen_tokens | generate tokens for node components] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.078) 0:02:37.391 *******
TASK [kubernetes/tokens : Gen_tokens | Get list of tokens from first master] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.075) 0:02:37.467 *******
TASK [kubernetes/tokens : Gen_tokens | Gather tokens] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.075) 0:02:37.542 *******
TASK [kubernetes/tokens : Gen_tokens | Copy tokens on masters] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.054) 0:02:37.596 *******
TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | see if old config exists] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.073) 0:02:37.669 *******
ok: [monstrinho -> None] => {"changed": false, "cmd": ["/usr/local/bin/etcdctl", "--peers=https://10.0.1.2:2379", "ls", "/registry/minions"], "delta": "0:00:00.023428", "end": "2019-01-29 13:12:20.196620", "failed_when_result": false, "msg": "non-zero return code", "rc": 4, "start": "2019-01-29 13:12:20.173192", "stderr": "Error: 100: Key not found (/registry) [14]", "stderr_lines": ["Error: 100: Key not found (/registry) [14]"], "stdout": "", "stdout_lines": []}
TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | use etcd2 unless forced to etcd3] ****************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.448) 0:02:38.118 *******
TASK [kubernetes/master : Pre-upgrade | Delete master manifests] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.052) 0:02:38.170 *******
TASK [kubernetes/master : Pre-upgrade | Delete master containers forcefully] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.071) 0:02:38.242 *******
TASK [kubernetes/master : Make sure the users directory exits] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.070) 0:02:38.313 *******
TASK [kubernetes/master : Populate users for basic auth in API] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.049) 0:02:38.362 *******
TASK [kubernetes/master : Create webhook token auth config] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.061) 0:02:38.424 *******
TASK [kubernetes/master : Write secrets for encrypting secret data at rest] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.239) 0:02:38.663 *******
TASK [kubernetes/master : Install | Copy kubectl binary from download dir] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.075) 0:02:38.739 *******
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/hyperkube /usr/local/bin/kubectl", "msg": "", "rc": 0, "stdout_lines": []}
TASK [kubernetes/master : install | Set kubectl binary permissions] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:20 -0200 (0:00:00.255) 0:02:38.994 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubectl", "size": 177749912, "state": "file", "uid": 0}
TASK [kubernetes/master : Install kubectl bash completion] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:20 -0200 (0:00:00.550) 0:02:39.544 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl completion bash >/etc/bash_completion.d/kubectl.sh", "delta": "0:00:00.106103", "end": "2019-01-29 13:12:22.098300", "rc": 0, "start": "2019-01-29 13:12:21.992197", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [kubernetes/master : Set kubectl bash completion file] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.522) 0:02:40.067 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/bash_completion.d/kubectl.sh", "size": 375407, "state": "file", "uid": 0}
TASK [kubernetes/master : Disable SecurityContextDeny admission-controller and enable PodSecurityPolicy] *************************************************************************************************************************************
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.357) 0:02:40.424 *******
TASK [kubernetes/master : kubeadm | Check if old apiserver cert exists on host] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.072) 0:02:40.496 *******
ok: [monstrinho -> None] => {"changed": false, "stat": {"exists": false}}
TASK [kubernetes/master : Copy old certs to the kubeadm expected path] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.427) 0:02:40.924 *******
TASK [kubernetes/master : kubeadm | Check apiserver key] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.178) 0:02:41.102 *******
ok: [monstrinho -> None] => {"changed": false, "stat": {"atime": 1548773262.5620532, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "e92e08712e712d799d59ccc1939971da80eca3c1", "ctime": 1548773238.8861935, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201896, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548773238.8861935, "nlink": 1, "path": "/etc/kubernetes/ssl/apiserver.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/master : kubeadm | Check if kubeadm has already run] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.417) 0:02:41.520 *******
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548773238.0061986, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "066396b240069501e5c138604634e46cb93f40fa", "ctime": 1548773238.0061986, "dev": 69, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 132, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1548773238.0061986, "nlink": 1, "path": "/var/lib/kubelet/config.yaml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1745, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/master : kubeadm | Delete old admin.conf] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.485) 0:02:42.005 *******
TASK [kubernetes/master : kubeadm | Delete old static pods] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.052) 0:02:42.058 *******
TASK [kubernetes/master : kubeadm | Forcefully delete old static pods] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.075) 0:02:42.134 *******
TASK [kubernetes/master : kubeadm | aggregate all SANs] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.070) 0:02:42.204 *******
ok: [monstrinho] => {"ansible_facts": {"apiserver_sans": "kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local 10.233.0.1 localhost 127.0.0.1 monstrinho 10.0.1.2"}, "changed": false}
TASK [kubernetes/master : kubeadm | Copy etcd cert dir under k8s cert dir] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.213) 0:02:42.418 *******
ok: [monstrinho] => {"changed": false, "cmd": ["cp", "-TR", "/etc/ssl/etcd/ssl", "/etc/kubernetes/ssl/etcd"], "delta": "0:00:00.002671", "end": "2019-01-29 13:12:24.858496", "rc": 0, "start": "2019-01-29 13:12:24.855825", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [kubernetes/master : Create audit-policy directory] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.352) 0:02:42.770 *******
TASK [kubernetes/master : Write api audit policy yaml] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.062) 0:02:42.833 *******
TASK [kubernetes/master : set kubeadm_config_api_fqdn define] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.052) 0:02:42.886 *******
TASK [kubernetes/master : gets the kubeadm version] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.058) 0:02:42.944 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "version", "-o", "short"], "delta": "0:00:00.014567", "end": "2019-01-29 13:12:25.282836", "rc": 0, "start": "2019-01-29 13:12:25.268269", "stderr": "", "stderr_lines": [], "stdout": "v1.13.2", "stdout_lines": ["v1.13.2"]}
TASK [kubernetes/master : sets kubeadm api version to v1alpha1] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.259) 0:02:43.204 *******
TASK [kubernetes/master : sets kubeadm api version to v1alpha2] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.054) 0:02:43.258 *******
TASK [kubernetes/master : sets kubeadm api version to v1alpha3] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.053) 0:02:43.312 *******
TASK [kubernetes/master : sets kubeadm api version to v1beta1] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.053) 0:02:43.366 *******
ok: [monstrinho] => {"ansible_facts": {"kubeadmConfig_api_version": "v1beta1"}, "changed": false}
TASK [kubernetes/master : kubeadm | Create kubeadm config] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.136) 0:02:43.503 *******
ok: [monstrinho] => {"changed": false, "checksum": "8e326d926add2e223648a5366b902c63bf15b8e7", "dest": "/etc/kubernetes/kubeadm-config.yaml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubeadm-config.yaml", "size": 2417, "state": "file", "uid": 0}
TASK [kubernetes/master : Backup old certs and keys] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:25 -0200 (0:00:00.641) 0:02:44.144 *******
changed: [monstrinho] => (item={u'dest': u'apiserver.crt.old', u'src': u'apiserver.crt'}) => {"changed": true, "checksum": "0c928abf271696be5deeea7b94f14cae84de4a12", "dest": "/etc/kubernetes/ssl/apiserver.crt.old", "gid": 0, "group": "root", "item": {"dest": "apiserver.crt.old", "src": "apiserver.crt"}, "md5sum": "811b07032d0a11bbd49135180ac1ed19", "mode": "0644", "owner": "root", "size": 1424, "src": "/etc/kubernetes/ssl/apiserver.crt", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'apiserver.key.old', u'src': u'apiserver.key'}) => {"changed": true, "checksum": "e92e08712e712d799d59ccc1939971da80eca3c1", "dest": "/etc/kubernetes/ssl/apiserver.key.old", "gid": 0, "group": "root", "item": {"dest": "apiserver.key.old", "src": "apiserver.key"}, "md5sum": "5188f29e5ef544743ee25f085864a351", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/apiserver.key", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'apiserver-kubelet-client.crt.old', u'src': u'apiserver-kubelet-client.crt'}) => {"changed": true, "checksum": "7b21c18c2a70ce35b6d8c885381dc905e0e20f7f", "dest": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt.old", "gid": 0, "group": "root", "item": {"dest": "apiserver-kubelet-client.crt.old", "src": "apiserver-kubelet-client.crt"}, "md5sum": "da5cf07280793d8dd24a7fc21bfdf1fd", "mode": "0644", "owner": "root", "size": 1099, "src": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'apiserver-kubelet-client.key.old', u'src': u'apiserver-kubelet-client.key'}) => {"changed": true, "checksum": "0ce6a50f6f8ba65c5ca80bd2f2071aaa3f4946bd", "dest": "/etc/kubernetes/ssl/apiserver-kubelet-client.key.old", "gid": 0, "group": "root", "item": {"dest": "apiserver-kubelet-client.key.old", "src": "apiserver-kubelet-client.key"}, "md5sum": "c2192e0565eda67f5657989ea1fd4bf5", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'front-proxy-client.crt.old', u'src': u'front-proxy-client.crt'}) => {"changed": true, "checksum": "6828baee5b815b064bcb9c577d89394e85bed8b9", "dest": "/etc/kubernetes/ssl/front-proxy-client.crt.old", "gid": 0, "group": "root", "item": {"dest": "front-proxy-client.crt.old", "src": "front-proxy-client.crt"}, "md5sum": "c552d0fe86eb8776e507467fe8b530dd", "mode": "0644", "owner": "root", "size": 1058, "src": "/etc/kubernetes/ssl/front-proxy-client.crt", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'front-proxy-client.key.old', u'src': u'front-proxy-client.key'}) => {"changed": true, "checksum": "faf4d7a989b9beeb2b3fbc03ad759b82b608e1cd", "dest": "/etc/kubernetes/ssl/front-proxy-client.key.old", "gid": 0, "group": "root", "item": {"dest": "front-proxy-client.key.old", "src": "front-proxy-client.key"}, "md5sum": "1736be3ddb07f1ab023c6d587a52e2e6", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/front-proxy-client.key", "state": "file", "uid": 0}
TASK [kubernetes/master : Remove old certs and keys] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:26 -0200 (0:00:01.448) 0:02:45.592 *******
changed: [monstrinho] => (item=apiserver.crt) => {"changed": true, "item": "apiserver.crt", "path": "/etc/kubernetes/ssl/apiserver.crt", "state": "absent"}
changed: [monstrinho] => (item=apiserver.key) => {"changed": true, "item": "apiserver.key", "path": "/etc/kubernetes/ssl/apiserver.key", "state": "absent"}
changed: [monstrinho] => (item=apiserver-kubelet-client.crt) => {"changed": true, "item": "apiserver-kubelet-client.crt", "path": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "state": "absent"}
changed: [monstrinho] => (item=apiserver-kubelet-client.key) => {"changed": true, "item": "apiserver-kubelet-client.key", "path": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "state": "absent"}
changed: [monstrinho] => (item=front-proxy-client.crt) => {"changed": true, "item": "front-proxy-client.crt", "path": "/etc/kubernetes/ssl/front-proxy-client.crt", "state": "absent"}
changed: [monstrinho] => (item=front-proxy-client.key) => {"changed": true, "item": "front-proxy-client.key", "path": "/etc/kubernetes/ssl/front-proxy-client.key", "state": "absent"}
TASK [kubernetes/master : Generate new certs and keys] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:27 -0200 (0:00:00.943) 0:02:46.536 *******
changed: [monstrinho] => (item=apiserver) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "apiserver", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.256491", "end": "2019-01-29 13:12:29.132740", "item": "apiserver", "rc": 0, "start": "2019-01-29 13:12:28.876249", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"apiserver\" certificate and key\n[certs] apiserver serving cert is signed for DNS names [monstrinho kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local localhost monstrinho] and IPs [10.233.0.1 10.0.1.2 10.0.1.2 10.233.0.1 127.0.0.1 10.0.1.2]", "stdout_lines": ["[certs] Generating \"apiserver\" certificate and key", "[certs] apiserver serving cert is signed for DNS names [monstrinho kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local localhost monstrinho] and IPs [10.233.0.1 10.0.1.2 10.0.1.2 10.233.0.1 127.0.0.1 10.0.1.2]"]}
changed: [monstrinho] => (item=apiserver-kubelet-client) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "apiserver-kubelet-client", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.235532", "end": "2019-01-29 13:12:29.516183", "item": "apiserver-kubelet-client", "rc": 0, "start": "2019-01-29 13:12:29.280651", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"apiserver-kubelet-client\" certificate and key", "stdout_lines": ["[certs] Generating \"apiserver-kubelet-client\" certificate and key"]}
changed: [monstrinho] => (item=front-proxy-client) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "front-proxy-client", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.207188", "end": "2019-01-29 13:12:29.838709", "item": "front-proxy-client", "rc": 0, "start": "2019-01-29 13:12:29.631521", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"front-proxy-client\" certificate and key", "stdout_lines": ["[certs] Generating \"front-proxy-client\" certificate and key"]}
TASK [kubernetes/master : Generate new certs and keys] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:28 -0200 (0:00:01.226) 0:02:47.763 *******
TASK [kubernetes/master : kubeadm | Initialize first master] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:28 -0200 (0:00:00.101) 0:02:47.865 *******
TASK [kubernetes/master : slurp kubeadm certs] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:29 -0200 (0:00:00.089) 0:02:47.954 *******
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver.crt", "source": "/etc/kubernetes/ssl/apiserver.crt"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver.key", "source": "/etc/kubernetes/ssl/apiserver.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver-kubelet-client.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "source": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver-kubelet-client.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "source": "/etc/kubernetes/ssl/apiserver-kubelet-client.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/ca.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.crt", "source": "/etc/kubernetes/ssl/ca.crt"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/ca.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.key", "source": "/etc/kubernetes/ssl/ca.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-ca.crt) => {"changed": false, "content": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMwRENDQWJpZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFaTVJjd0ZRWURWUVFERXc1bWNtOXUKZEMxd2NtOTRlUzFqWVRBZUZ3MHhPVEF4TWpreE5EUTNNVGhhRncweU9UQXhNall4TkRRM01UaGFNQmt4RnpBVgpCZ05WQkFNVERtWnliMjUwTFhCeWIzaDVMV05oTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCCkNnS0NBUUVBeVJvUU85ZXJTUE1RQ2FoOWtyRnhZRFNXZ1BBQjV0YVJsSkhWRnN5NnM1VTFzODJqcC9KRHBpSTUKU0s4OUtMckFXSHpuUDFrbkNKMjRxeWVBbW0xRTRJMXFvRGxKSHE1eDVDVTk5YktEUE1uZmN0Y1JPQ0ZjM0x5WQpWaDBRR2NteUtrOFo1R241RzhyTE1NNFFUK0trYktLbDNMRmd0enJNKzFBR0dwZjZPUTRtaS9sZjF5YzBQUmRqCldOdEpGTy80dVdnT1dMNEpkQVYzOGFscm5qSVgzdHY4cW15dGJtMmRHOUJtekUyeC8zcmhwdUNITllhdkxTUGwKUkNETkpsVWJpVDZWM092azNENE1oVVFGMExsY2ZoWVlXZlYzSGYvRkhZZWVqSnMrZ1luMEhlRzVsUW1zQ0FCMApSSElQai9URFVRazUyUk0zTmRXRFVaK1JmaUNTZ3dJREFRQUJveU13SVRBT0JnTlZIUThCQWY4RUJBTUNBcVF3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQURrbkJUckJiZDVlSXF6ZlMKV1lPckx5L2ZOL1puUGhlSE9NZFFHbzd5THJjT0pPR0xKNjFOeHFuK1VUNVpHMlRNYXRZNmQ4VENTN29yNE5TTAoxTkdsUTdiVG9YbjVHVmNrdjBCbFc4NHpST3lHSWhBSnZCd2RQNm51dnZwYW5HaFVza2M1cUJ2YmhrZ3NPSkhHCmtUK2xpdEFCd0pyMlNCR2o4Sm1IZi9HY0VLblBEeFd0cE1Mak5pZ0x1WnEvblh1QmFFWW1IakQ3ejRLVjg5NDEKTCtsWXJWZU11WEZYU1ZBREl6dCtZY3FnWVdvZXo1N2hMMXRBeVV3MUk0cHhlV24yUEZkajE4a2hjcGNoNUJycQo5YTdPRmh0WWxWd2ZtdzZTZWtuU3dSd2RYRmZMZC9uTitTS1pMTUZJSE5pQ3Bqa0liYkhBMXh3NXJ4Mk56Z3NuCkhZQlVjUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-ca.crt", "source": "/etc/kubernetes/ssl/front-proxy-ca.crt"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-ca.key) => {"changed": false, "content": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcEFJQkFBS0NBUUVBeVJvUU85ZXJTUE1RQ2FoOWtyRnhZRFNXZ1BBQjV0YVJsSkhWRnN5NnM1VTFzODJqCnAvSkRwaUk1U0s4OUtMckFXSHpuUDFrbkNKMjRxeWVBbW0xRTRJMXFvRGxKSHE1eDVDVTk5YktEUE1uZmN0Y1IKT0NGYzNMeVlWaDBRR2NteUtrOFo1R241RzhyTE1NNFFUK0trYktLbDNMRmd0enJNKzFBR0dwZjZPUTRtaS9sZgoxeWMwUFJkaldOdEpGTy80dVdnT1dMNEpkQVYzOGFscm5qSVgzdHY4cW15dGJtMmRHOUJtekUyeC8zcmhwdUNICk5ZYXZMU1BsUkNETkpsVWJpVDZWM092azNENE1oVVFGMExsY2ZoWVlXZlYzSGYvRkhZZWVqSnMrZ1luMEhlRzUKbFFtc0NBQjBSSElQai9URFVRazUyUk0zTmRXRFVaK1JmaUNTZ3dJREFRQUJBb0lCQUVkMXMzOFFUQlZJQ2RMawp4SHAwQTAya1lqYS9FbTNzb1I2aUU0NWVnWmwrMCs1b2pGY0poM0JwaU9HREk4QnRYQndWaGpiRWYxSlllVjZZClV1S05JWVNKdS9IamFWQTF2TkxOU1E4ZHQvVEo1MVR2aDNiaXBCVHNEMVhLVGdaYjNhdWJJQ0JDWi9xd1BUUEMKaFpsZGVBQUNhOTNZU2YzU0x6UytZdXpnUkZJeFN1ZmlMdDJFNGpJTTlEMkxSK3NwM0l4NDJKQkFabVZvaFcvQQpxR0tNeUpmb2VUL1lSS2pwTlFQeDFUSlZLS0l6UndXZ0FlZXlnczVIOFc4elNSSXhZdDM5cWRucDBRTmZYR0NZCjBVNjliNDRFYlZpZkgrN0g0YWJIRldIem5USitoVkUxSnU5MyszbGJxRjRlMlBLV2F2dmxCODRFRURDa08xQlEKeHJCWWk0RUNnWUVBL0VoWFVBMTV4V2pjYnZWSGZUVTNycmo4QlkzWG45VWVCNzdBR08vckpoQUF6VnNwMTNoSwpRQ2p0OCtlaDBnaWFpenVONnNSQTFWTjV2QTNDZEhOWERlWkNsazh4QVc4TENtcWlWOEdwcnJhbG8wc21ZdzZZCmFVUHIveTJHWEFMZ2FKTkdFMDdhdkR3aitmOXpEYnlkRzVMNHA4QkJMQi9TZzRTVFBYdnNmMHNDZ1lFQXpCQ28KbFVtWG9Gb3MvWmh2bDVDNlp5RDlRbmg4endyU05vRjIveG12ajdOb0RqMWtZVlpJVWxiTXR1b3ZsRzNSdWNpNgpZMThGTDVYVXVtb2RXcWxoTWxEQW81SVdPbTZ3cmpVaURnSThTTWlKN0cyUHdQcE10U0JPTUFac3Y1bzhQQ0h0CjlrQTNGVDY1TVp3UlR6THhVUzZLOGhpd3BSdnhkSW5RdHRmcFhxa0NnWUIxamhmeFczWWtnS3BHb2RDQURXNDIKNGtlOUpzMFUweSs5R0N0VzgyUzFSYnU1OVFMWVBsc0s3b2VDb2FxTHZpcVZPbGowemlJUHhXZnlNczhyaUJ0RwpoTWIrVjBSVWtMT3FWT24wem04TTFGcjJiaXdpK0VnWXRPZWc3a3V2VUQvVk90cnFZRklZYUVXelZrNzhWYWszCmtoSi95RndWL1hZUWhwUTlrQ014WlFLQmdRQ29VMWxzQTA5U1V1L25vMVR4VmMyY2dlYkdiTEt1NmdNcU9MS2EKakdwM2c0cGlySnRmZXhlZTY4QmpaVnNuK1VwVkVGRkc1THRYWENVa082SEpCZ3lKdjNpWHRFb25tdVNjWG5HZgowcEk5aTBYUnd6SWdBWmRDbE1wSjdSTEpIWVZ3S0tDc1RwM2hKV01IbSsvZlAyczFCc3BRRnJPbkRoeW1mNE90ClB2NWVPUUtCZ1FEb1V5emsrMEE4VWtMN2dmYktIelFoN24zb0ZmQzFUOFB6MEc2UDVOanRoK3U5TnNUaEo2WUkKaVNYcUZhZHRrTFp4M0lyOGlyMkFyVDFSRlRTSzZLUXdDcStpT21hdnNRTG5NZHlQSlZIcitQZHJGZFdHbjlwMwphZXJsVlY0NS9TbnZLSm5WSGFUZU5PZWJWTXJ3R3dUMGVOM1ZIV0R2WFZqeFIxbi9QVWZ5eEE9PQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-ca.key", "source": "/etc/kubernetes/ssl/front-proxy-ca.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-client.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-client.crt", "source": "/etc/kubernetes/ssl/front-proxy-client.crt"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-client.key) => {"changed": false, "content": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcEFJQkFBS0NBUUVBMlYxQnMxems0NUp1OTJTNzJnT1NFSEFvc1h1RWlsMHBnbjY3dGh2ZlVKNUY2WWkzCkNXSGxiSnpLb09hclcvNjZsdGRiTGVDUG9wMFd6MjZFTCt2VkFYWnJ6YU1sck5WTEhVRm00VnM0K3ZaZ05hL3oKOStOczI2a29LTkxOcXVld05yY2dhTGdtUkpxcUUxLzBIQ3RJaTRPUzBFeG5ESG9PTW5pS0tKNHlCaWF5ODdVRAo5NDRIajlOTzAyc21UK0JmKzRMV3YyWW1jM3Z2Mi9ONTZPT0c4RWVuUlFNYXhhT0xYOTFLb1N3UHhVL1NFUzM0CkkyTm55UGRSSWh0d2VBaTJ4b0JZRHphNlVRWXdIQm1qbGw2ZnBqOHZEN29tUVdUZ1JwSGVtSGZFNjFMVkdWNVUKMU5UUHZOdlkyVE85cEE0N0FSL2pwTVJTcGg0UVM0VytOa3cxNVFJREFRQUJBb0lCQUI5TW8zSk5kUlFqK09DYwoyOFAzOGFkMlR4WEhnSDFnRHVNZ2xxMFJkR1dxZE15OUNBWk0xM2w5Vmx3Mit3UGpPVUVSUDZycWhDUlpWSGlJCkpIYTJFZFVGRlY3bUdEMjc5UFlBZmUwRGNzQUlqREFPNXlXUjFSSUlXS1VRUGRkWFIzT0ppUndyTUM5K3lmREMKUjJkckFDWSt5dnc5bERVaXVqcWdTdHl3Y3VtWmt3V2FHckZoVWVML21WZlAzeGNDVmZLa3ZZazdHcy8xU3FOQwoxUXVOUkVBU3BML2ozVnZMeFNpTGJ6djI2dmVRcXhRMmsyemRJb2pzZU8rYUl6eFNiaFkxb0VEdHpUMjd2ZHZ3CjhlSFRrNmtsczZtZHhXTmJjYkNwU3JsVFE3WG5yN1Y5MnFoR3kzUDRySDRuTzBLL3pZM0xQZEx4OVhPa0huazAKUW1ZRlF3RUNnWUVBNXR6RWM4Unp3K0FEbW14Q2RheXhSZEdUYUNjcEhleW5tQ0NYbnkvNDQ3TFA4YXZkK29GNQp1dDhtejZncWh6ZytZc3Q1UjBhZnkwL21IcER1eFI2OGx5cFNZWkxBSThKOG53WDB6Wnh6QmxOVUoycTF4UlJYCnEvcC9nMFkxdHduaW9PcWdMUm9qbk1ibEtlbTdHam1xZ3V4bHpzUnpFOEc4L2ZTZFRzY2NhY0VDZ1lFQThRZzcKdVpVcTFQakZRRjVXTmxMbkluNFF2VXFxQjR4alFwV3hnNVJDV0hEblhyams5cHVsTU1UWEpjaEJFVHR6dWZUMQpFdHg2Um9GSld0SnAzM0trcnRNZXUxeGV4QWpodmMwRG5CZkdaT3ZuOFVoNWFCQVZqdVk4aDNlL2kwSWI3ZzNFCmxJOXdaanpYL1dSbHNUbFFpQ2gwTmtxK1Z6eHlLS0VidDNNYUxTVUNnWUJxRWQ3VkRkcmVrU3MycFN6MzRndGsKOThDUlp3UzJNZ2hpbGY3ejdkZWR6b2RLRTF3ZS82UU5Ydi8zQXQzZldORVpGVUc0cE5OQVY0cDBXc1RKbnJDcApoNUZvTVVQRWFsUlZ3Q2ZVM0YvZzlTSkNKZjR6K1grNmpaSk9uMUNJczZzRG9pbEw3Nm1URzdNb3liSGtmOEErCi9SeGRudGI4cWRRS25udzBPTGx1UVFLQmdRQ0hFRW9IY0dNVC9HTHI4dkQwZC9nMUI5ZHhld2xVT1lMVnFQUlQKK3h4Q1d1SUwzaWZQV09CME41a24vdE1YU08xTVlzdUJ5akpxbDcvM09MbERFUWJmUUVhVVR1cDdoMDZZQU8zbwo1aG15Szg5SkVZZVduSXk0Q3FRWWRTM01aenNuWm1lbHA4c2dQeS81T2UwU0pqL09USHp5ZjJleGtwbVYwdEdwCk5zS1FVUUtCZ1FDYTZwSXV6RjV0N3lqYjZTRE5ZQ2IrQ1duUDNiK3YzOE93UG1HbmNzQlRaL3lxTE5lNU8zV3AKdDUyQStYeGt4QWJRaVNxTzhGV0t5NHZPQ2dscThLc0V4VXVtcDFWdGZOcGNqeEdGRWpOaCtRRUFUK3hpdjFIKwpxd1hPUGlxck5rUVNxSVZTMVk0OGNwWVJMNm5rZGJMekdVVkYxSGZZOTM2VWRkNkZ0M3NYS3c9PQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-client.key", "source": "/etc/kubernetes/ssl/front-proxy-client.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/sa.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/sa.key", "source": "/etc/kubernetes/ssl/sa.key"}
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/sa.pub) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/sa.pub", "source": "/etc/kubernetes/ssl/sa.pub"}
TASK [kubernetes/master : kubeadm | write out kubeadm certs] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:30 -0200 (0:00:01.481) 0:02:49.436 *******
TASK [kubernetes/master : Backup old configuration files] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:30 -0200 (0:00:00.163) 0:02:49.599 *******
changed: [monstrinho] => (item={u'dest': u'admin.conf.old', u'src': u'admin.conf'}) => {"changed": true, "checksum": "2d3c94f30ca053ebaf2a823eadf895d419d65628", "dest": "/etc/kubernetes/admin.conf.old", "gid": 0, "group": "root", "item": {"dest": "admin.conf.old", "src": "admin.conf"}, "md5sum": "029d302d886f105ac69a1ba5711dd263", "mode": "0644", "owner": "root", "size": 5460, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'kubelet.conf.old', u'src': u'kubelet.conf'}) => {"changed": true, "checksum": "49d608ec5b98ed6550835bc35779ac2a1e33812a", "dest": "/etc/kubernetes/kubelet.conf.old", "gid": 0, "group": "root", "item": {"dest": "kubelet.conf.old", "src": "kubelet.conf"}, "md5sum": "8d950a419eb738459f12d5dd6da27012", "mode": "0644", "owner": "root", "size": 5488, "src": "/etc/kubernetes/kubelet.conf", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'controller-manager.conf.old', u'src': u'controller-manager.conf'}) => {"changed": true, "checksum": "c0807eced929128db23ef3e66cb22550cb368e7a", "dest": "/etc/kubernetes/controller-manager.conf.old", "gid": 0, "group": "root", "item": {"dest": "controller-manager.conf.old", "src": "controller-manager.conf"}, "md5sum": "239f7e95cb96f1bbb1e27253220c49ac", "mode": "0644", "owner": "root", "size": 5492, "src": "/etc/kubernetes/controller-manager.conf", "state": "file", "uid": 0}
changed: [monstrinho] => (item={u'dest': u'scheduler.conf.old', u'src': u'scheduler.conf'}) => {"changed": true, "checksum": "73b0ba1d3a598bd469626ba545632fd0a54ca403", "dest": "/etc/kubernetes/scheduler.conf.old", "gid": 0, "group": "root", "item": {"dest": "scheduler.conf.old", "src": "scheduler.conf"}, "md5sum": "93ec8657c209af6ce83ece933f6b7921", "mode": "0644", "owner": "root", "size": 5440, "src": "/etc/kubernetes/scheduler.conf", "state": "file", "uid": 0}
TASK [kubernetes/master : Remove old configuration files] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:31 -0200 (0:00:00.948) 0:02:50.547 *******
changed: [monstrinho] => (item=admin.conf) => {"changed": true, "item": "admin.conf", "path": "/etc/kubernetes/admin.conf", "state": "absent"}
changed: [monstrinho] => (item=kubelet.conf) => {"changed": true, "item": "kubelet.conf", "path": "/etc/kubernetes/kubelet.conf", "state": "absent"}
changed: [monstrinho] => (item=controller-manager.conf) => {"changed": true, "item": "controller-manager.conf", "path": "/etc/kubernetes/controller-manager.conf", "state": "absent"}
changed: [monstrinho] => (item=scheduler.conf) => {"changed": true, "item": "scheduler.conf", "path": "/etc/kubernetes/scheduler.conf", "state": "absent"}
TASK [kubernetes/master : Generate new configuration files] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:32 -0200 (0:00:00.689) 0:02:51.237 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "kubeconfig", "all", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:01.092394", "end": "2019-01-29 13:12:34.670344", "rc": 0, "start": "2019-01-29 13:12:33.577950", "stderr": "", "stderr_lines": [], "stdout": "[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n[kubeconfig] Writing \"admin.conf\" kubeconfig file\n[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n[kubeconfig] Writing \"scheduler.conf\" kubeconfig file", "stdout_lines": ["[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"", "[kubeconfig] Writing \"admin.conf\" kubeconfig file", "[kubeconfig] Writing \"kubelet.conf\" kubeconfig file", "[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file", "[kubeconfig] Writing \"scheduler.conf\" kubeconfig file"]}
TASK [kubernetes/master : Generate new configuration files] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:33 -0200 (0:00:01.355) 0:02:52.593 *******
TASK [kubernetes/master : kubeadm | Init other uninitialized masters] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.059) 0:02:52.652 *******
TASK [kubernetes/master : kubeadm | Upgrade first master] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.056) 0:02:52.709 *******
TASK [kubernetes/master : kubeadm | Upgrade other masters] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.051) 0:02:52.760 *******
TASK [kubernetes/master : kubeadm | Check apiserver key again] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.072) 0:02:52.832 *******
ok: [monstrinho -> None] => {"changed": false, "stat": {"atime": 1548774750.34112, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "690e8cd1da47040ddef09e31f572b21bcf2d7211", "ctime": 1548774749.125083, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201924, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548774749.125083, "nlink": 1, "path": "/etc/kubernetes/ssl/apiserver.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/master : kubeadm | Set secret_changed if service account key was updated] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:34 -0200 (0:00:00.502) 0:02:53.335 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002183", "end": "2019-01-29 13:12:35.945578", "rc": 0, "start": "2019-01-29 13:12:35.943395", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [kubernetes/master : kubeadm | Retrieve files to purge] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.629) 0:02:53.965 *******
TASK [kubernetes/master : kubeadm | Purge old certs] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.052) 0:02:54.018 *******
TASK [kubernetes/master : kubeadm | Purge old kubeconfig] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.060) 0:02:54.078 *******
TASK [kubernetes/master : kubeadm | Remove taint for master with node role] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.083) 0:02:54.162 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "--kubeconfig", "/etc/kubernetes/admin.conf", "taint", "node", "monstrinho", "node-role.kubernetes.io/master:NoSchedule-"], "delta": "0:00:01.995821", "end": "2019-01-29 13:12:38.808502", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:12:36.812681", "stderr": "error: taint \"node-role.kubernetes.io/master:NoSchedule\" not found", "stderr_lines": ["error: taint \"node-role.kubernetes.io/master:NoSchedule\" not found"], "stdout": "", "stdout_lines": []}
TASK [kubernetes/client : Set external kube-apiserver endpoint] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:37 -0200 (0:00:02.572) 0:02:56.735 *******
ok: [monstrinho] => {"ansible_facts": {"external_apiserver_address": "10.0.1.2", "external_apiserver_port": "6443"}, "changed": false}
TASK [kubernetes/client : Create kube config dir] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.142) 0:02:56.877 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.kube", "size": 10, "state": "directory", "uid": 0}
TASK [kubernetes/client : Copy admin kubeconfig to root user home] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.354) 0:02:57.231 *******
changed: [monstrinho] => {"backup_file": "/root/.kube/config.25845.2019-01-29@13:12:39~", "changed": true, "checksum": "c3c978ca3d58bb2392a40095913bed66ff19d9d9", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "e3befcbe27acd95aa7f633f45c2118bb", "mode": "0600", "owner": "root", "size": 5456, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0}
TASK [kubernetes/client : Generate admin kubeconfig with external api endpoint] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.340) 0:02:57.571 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubeadm alpha kubeconfig user --client-name kubernetes-admin --org system:masters --cert-dir /etc/kubernetes/ssl --apiserver-advertise-address 10.0.1.2 --apiserver-bind-port 6443", "delta": "0:00:01.654824", "end": "2019-01-29 13:12:41.562743", "rc": 0, "start": "2019-01-29 13:12:39.907919", "stderr": "", "stderr_lines": [], "stdout": "apiVersion: v1\nclusters:\n- cluster:\n certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUN5RENDQWJDZ0F3SUJBZ0lCQURBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwcmRXSmwKY201bGRHVnpNQjRYRFRFNU1ERXlPVEUwTkRjeE9Gb1hEVEk1TURFeU5qRTBORGN4T0Zvd0ZURVRNQkVHQTFVRQpBeE1LYTNWaVpYSnVaWFJsY3pDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTXY5CnJoYXljblZvUTk0dHNheCtrUkIwTkViTi95WHgrNVUrOFlIVjNpMWhzVlJZanlPVTVOY042dUFSMkVGNWhxZ0gKZmtHTVl3OTQyeW5uaDd6dU1FUFFWaHJHZnE2RFVBYUxSQWN3VTdsUlNXUE10OVg1U2pYVlNGbnBiUEhXZUNjMgpFcEt2cmV6d2doWitUYThVeGVZQUp6SjRBWkxINmhQN1VIbmh0bWNmc1JGVlVuQXh1VkNVdUtRM1lPT2lOZ3oxCjJ3T0NpK0hRbGVKbmZCOGs3L21JUy9wcjZVWWRvMTJtdTBzNnB3K1k0K1duMTBJZm5YbEtXTkw4VXdNV0pYR1MKakdVQlpPc2ZzZXhVRXUzelQyVFhmQjdSZXpYUFpmdGY4YVNaWEtMVG9JbXJFM1ozT2Q1TzNiYVN4WGs0aEYzdwp2bVdxSWVZY3JBNWlFcDVKZmprQ0F3RUFBYU1qTUNFd0RnWURWUjBQQVFIL0JBUURBZ0trTUE4R0ExVWRFd0VCCi93UUZNQU1CQWY4d0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFIMm85RyttUktuLy9adzEwaEZRSUlmMjloVEUKNjdEbVBOblpPMFVFZFJ4V0Z5TmNuYVdITkQzeTFrbExnMEYwSzhJeXR3VEJaM1VxSHRyQ25jYTFUU3NSbWNVZQp6M0h5MDFGNUFXd2R5OURsN1JYakVSZjd1elF2Vy94WUZvanN6a2JpdldncExIdzgyd3JlRmtOcmd6akY3N0p5Cm1BUXNIcnkrWS9HZ3RFYUtGT3lka3V0dldKM2YxTEtZbTM2Q2N2S24vTEJubm51WXhRTU1oNGxnTjE4ODhVR1EKL3RWeDF1YmZWVWFHQkZCeldMdS9PUzdwNVpWTkVVOGZROHlrdmVDVUhOM05LZ1BiS21FMWdlb1lxOWpVQllIRAo1NVlObE41Ylh3MVpSS1phZGRRK3ZhTGRBbU5ETC9aaExiMjVtUmZJNEk5L3Z2NU4rbjNhVHExcVpXTT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=\n server: https://10.0.1.2:6443\n name: kubernetes\ncontexts:\n- context:\n cluster: kubernetes\n user: kubernetes-admin\n name: kubernetes-admin@kubernetes\ncurrent-context: kubernetes-admin@kubernetes\nkind: Config\npreferences: {}\nusers:\n- name: kubernetes-admin\n user:\n client-certificate-data: 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\n client-key-data: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb3dJQkFBS0NBUUVBdTFOb0RhdDgrVFZxdHZFY25UQVNYSHdPMnZlM0J3STQyc3gzQUFxU1dRd050TW1XCkJHcEdKYXIrbUNyL2Y3UW5qanJHSktTTnpJL1dlczJCZjhFa1JYV2RUampEU3dTUE5xRm13Um5tdklRRmFyMTcKeW5RbmdiRFZsRTNpMi8vZ1VXS2FlQ0ZXdURvRWZTWEZSVGtUQm92WVVzRXFrM2plcC9WNVpkSkxMRk9MbkJycQpCRW45U1JYZUp2bWZ0d3JlS0ZBQ2lJVE9LWW1MbFlGZG1aK255alRLUW1DNnZ4SHdjS2xFWWxlMU1uRGFBT1ExCnE5RThZZzhhU3JLY0tsQWRjdE5ETEFSUnFrL1JJUUJ0U2hsZFkxOXo4QjZudlJ6bVgrUXJsSCtLUzZKNlF4RXYKVFNSV3FHa2x4cE8zM3V3RUp5cENHUnBkZDM5ci9SaVZiczgzWVFJREFRQUJBb0lCQUcxUVN0UlBVbXFMQlc4awpYTEpOcnlsUks4b1Q3RGFtMFU2OUttUlh4dmMzMVhlK2UxQ3dRNmNQbGVwdWpSS1VxdENRODdmR1h3a1VsdkNxCm8vdE5Wa0ZDVlQya1dqS1l3b242dmQvSm9hQTQyb0JqZXEyMkFxZm43WHJSeUtUaE9LSEZqS2ExcmNscjhkcW0KQSt4VlZnam42cURBSUh4V2VIaERBMGlyNHpwRnR2a3RaYU1mZ2JTUzBXTG9vL2FXS3kvMnBUand5NWh3eUREbApLL0VWbFNzMTE2d0lvcWtXRjdmZCtTeHBmV2lSeW9WaTZtT0NNa1o5RHFjQ21UYTBiQm45T0tsajBsamY4TE1SCnl3SlI2VXBkTjQ2YXZwUWY2cEwwTUZpenJKUms2emlPNXhaRVRSR0NBbGdPUFpCR2lreVZXWHdkcGlJUlpyUEcKUlVvR1Q5RUNnWUVBMWlvbkVjdW1pSWhEYzRyZ1YrcVQya09YcFg2QUdnbEhkcU5TNWJrb3VVdmhJK2l6NkRDMQp5b0gvYjFOTzFROTlFMmhLL3QyTks1bmliNTBwbEEyRGpUL2E2TFJMMVl0amlSVFJ6SHArMzBWd3NiejdlNGxtCk5UZkVWcVduOUNHTHViZmVCK1Y0cXE3Z1FYd1hDbXpZbGJ0ZlVFK0NKN1RYTFdVdis2Z21RaHNDZ1lFQTMrc2IKNGIvME5JdVA1S1FDdmp0TkM5VGJXZHNLYmhLNzUrWUVMeXFZZDFaaWFSb3dQcjUvUmF6QitndmlWVjlXRXhKLwpXYnRBVzgxWXUwQmRDY09McXVla1YxRkVrMkpOSzlVNDVXSFJhV1FSU1RyQXc5YkNaczhUMTA5ZUVqQVRtRjdtCkptN25jR01rckJvdUltSkhGemdsTU02YmZRTUFjQW90L3RudzVETUNnWUVBdEMrRTdZajlGUlFvUS9jTko0cmEKV0tIVDNjNWZzd2dwa3h4NHE0U3NTYklZdXlDVzlQeStocUgzS2svYUhKSktkbUNoOEdxdzBvVkhLUWIrcTJ6dgpTSkQzK2g5dlNqeGJRME03L0tEM1M1eGQ0M3lQelhGZGg5cmltdEFIVGZSSFhicmYySjd0ZGhWcDRrNm9DQUpwCit4aEphZ1ZyQ1VNeVl5UW1TY0pBWmc4Q2dZQmFNenRvRlFzcW40MjNiTm91QjNWaDdyenQxVzYrS0kzSlBMOHkKd05YcVBNSW4xSVRhd2FKRFR2UlU1YlNtNzJDZERqWit6dzk5NjVweTA5cW10RDd1K2FFYUM0SzBYRVQ2QTBxSQpISDlmRlJCaGoybFhlb3VWSHBXL2hoaysrbDdxWWxBVDYxa1B6T0JZODdMaDV2VDhSWUcxeDRTYk56cFY1OFBmCmhhdWtRUUtCZ0NPb1d2NzhPUUd0RVpkeWVIY3poeEpvSnNCc1Zianl1cWtZRXpNNWhMN3IvMWZXK0pNMlRMbkwKUmozaWQzdmdXRVJCb2pSVEZrY3FtSFlmUng4V3NUc01heU1lbzI0a1k1NzRDM1VPVWdXZVFLRlZxamxXeVVCRQptL3hySCt1SUVXYTNFWFFmbGNhWFg1MkRid25aOE5BbFFERUdRaTdQY0JvQWpCaXgrUE1YCi0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0tCg==", "stdout_lines": ["apiVersion: v1", "clusters:", "- cluster:", " certificate-authority-data: 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", " server: https://10.0.1.2:6443", " name: kubernetes", "contexts:", "- context:", " cluster: kubernetes", " user: kubernetes-admin", " name: kubernetes-admin@kubernetes", "current-context: kubernetes-admin@kubernetes", "kind: Config", "preferences: {}", "users:", "- name: kubernetes-admin", " user:", " client-certificate-data: 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", " client-key-data: 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"]}
TASK [kubernetes/client : Write admin kubeconfig on ansible host] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:40 -0200 (0:00:01.945) 0:02:59.517 *******
changed: [monstrinho -> localhost] => {"changed": true, "checksum": "a05332297ee83d91c20e8ae6232bb880f676459d", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/admin.conf", "gid": 20, "group": "staff", "md5sum": "7974acce2edb87714ee50a4e6e2df437", "mode": "0640", "owner": "yan", "size": 5443, "src": "/Users/yan/.ansible/tmp/ansible-tmp-1548774760.7-168106249943215/source", "state": "file", "uid": 501}
TASK [kubernetes/client : Copy kubectl binary to ansible host] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:41 -0200 (0:00:00.390) 0:02:59.907 *******
ok: [monstrinho] => {"changed": false, "checksum": "590344a1611ce0bbdad10bae4ec153693ca64ca2", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl", "file": "/usr/local/bin/kubectl", "md5sum": "c5e3602113c04dfb02232e182a37c99e"}
TASK [kubernetes/client : create helper script kubectl.sh on ansible host] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:42 -0200 (0:00:01.231) 0:03:01.138 *******
ok: [monstrinho -> localhost] => {"changed": false, "checksum": "0caf2b6af2083cd87af928e52cf23916a30bb09c", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl.sh", "gid": 20, "group": "staff", "mode": "0755", "owner": "yan", "path": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl.sh", "size": 65, "state": "file", "uid": 501}
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Wait for kube-apiserver] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:42 -0200 (0:00:00.370) 0:03:01.509 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:12:44 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"}
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Check AppArmor status] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.763) 0:03:02.272 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Set apparmor_enabled] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.051) 0:03:02.324 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Render templates for PodSecurityPolicy] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.054) 0:03:02.379 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add policies, roles, bindings for PodSecurityPolicy] *********************************************************************************************************************************
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.070) 0:03:02.450 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding to admit nodes] ***********************************************************************************************************************************************
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.082) 0:03:02.533 *******
ok: [monstrinho] => {"changed": false, "checksum": "7a5d333673421310e034bd1931c65d490d541632", "dest": "/etc/kubernetes/node-crb.yml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/node-crb.yml", "size": 408, "state": "file", "uid": 0}
TASK [kubernetes-apps/cluster_roles : Apply workaround to allow all nodes with cert O=system:nodes to register] ******************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.464) 0:03:02.997 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add webhook ClusterRole that grants access to proxy, stats, log, spec, and metrics on a kubelet] *************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.060) 0:03:03.058 *******
TASK [kubernetes-apps/cluster_roles : Apply webhook ClusterRole] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.055) 0:03:03.113 *******
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding for system:nodes to webhook ClusterRole] **********************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.054) 0:03:03.167 *******
TASK [kubernetes-apps/cluster_roles : Grant system:nodes the webhook ClusterRole] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.224 *******
TASK [kubernetes-apps/cluster_roles : Check if vsphere-cloud-provider ClusterRole exists] ****************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.052) 0:03:03.276 *******
TASK [kubernetes-apps/cluster_roles : Write vsphere-cloud-provider ClusterRole manifest] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.333 *******
TASK [kubernetes-apps/cluster_roles : Apply vsphere-cloud-provider ClusterRole] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.055) 0:03:03.388 *******
TASK [kubernetes-apps/cluster_roles : include_tasks] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.444 *******
TASK [kubernetes-apps/cluster_roles : PriorityClass | Copy k8s-cluster-critical-pc.yml file] *************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.062) 0:03:03.507 *******
ok: [monstrinho] => {"changed": false, "checksum": "2abb3233dd0241e931c969f251bdcd54183b1f88", "dest": "/etc/kubernetes/k8s-cluster-critical-pc.yml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/k8s-cluster-critical-pc.yml", "size": 235, "state": "file", "uid": 0}
TASK [kubernetes-apps/cluster_roles : PriorityClass | Create k8s-cluster-critical] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:45 -0200 (0:00:00.459) 0:03:03.966 *******
ok: [monstrinho] => {"changed": false, "msg": "success: priorityclass.scheduling.k8s.io/k8s-cluster-critical configured"}
RUNNING HANDLER [kubernetes/master : Master | set secret_changed] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:46 -0200 (0:00:01.001) 0:03:04.968 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.001421", "end": "2019-01-29 13:12:47.337078", "rc": 0, "start": "2019-01-29 13:12:47.335657", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
RUNNING HANDLER [kubernetes/master : Master | set secret_changed to true] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.320) 0:03:05.289 *******
ok: [monstrinho] => {"ansible_facts": {"secret_changed": true}, "changed": false}
RUNNING HANDLER [kubernetes/master : Master | Copy new kubeconfig for root user] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.126) 0:03:05.415 *******
ok: [monstrinho] => {"changed": false, "checksum": "c3c978ca3d58bb2392a40095913bed66ff19d9d9", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "e3befcbe27acd95aa7f633f45c2118bb", "mode": "0600", "owner": "root", "size": 5456, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0}
PLAY [k8s-cluster] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.361) 0:03:05.777 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.053) 0:03:05.831 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:47 -0200 (0:00:00.529) 0:03:06.360 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.528) 0:03:06.889 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.054) 0:03:06.943 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes/kubeadm : Set kubeadm_discovery_address] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.129) 0:03:07.072 *******
ok: [monstrinho] => {"ansible_facts": {"kubeadm_discovery_address": "10.0.1.2:6443"}, "changed": false}
TASK [kubernetes/kubeadm : Check if kubelet.conf exists] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.311) 0:03:07.384 *******
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548774753.9052277, "attr_flags": "", "attributes": [], "block_size": 5632, "blocks": 17, "charset": "us-ascii", "checksum": "a80d023c5e14f086b51a7128e5daff2a3b2a654e", "ctime": 1548774753.9052277, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201804, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548774753.9052277, "nlink": 1, "path": "/etc/kubernetes/kubelet.conf", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 5488, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}}
TASK [kubernetes/kubeadm : Calculate kubeadm CA cert hash] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.494) 0:03:07.878 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": "openssl x509 -pubkey -in /etc/kubernetes/ssl/ca.crt | openssl rsa -pubin -outform der 2>/dev/null | openssl dgst -sha256 -hex | sed 's/^.* //'", "delta": "0:00:00.005340", "end": "2019-01-29 13:12:50.344202", "rc": 0, "start": "2019-01-29 13:12:50.338862", "stderr": "", "stderr_lines": [], "stdout": "649bb22d95067066936d52cb2c4e21a1aed2fe03a208a18cfd975c671528f1de", "stdout_lines": ["649bb22d95067066936d52cb2c4e21a1aed2fe03a208a18cfd975c671528f1de"]}
TASK [kubernetes/kubeadm : Create kubeadm token for joining nodes with 24h expiration (default)] *********************************************************************************************************************************************
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.487) 0:03:08.366 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "token", "create"], "delta": "0:00:00.028727", "end": "2019-01-29 13:12:50.730972", "rc": 0, "start": "2019-01-29 13:12:50.702245", "stderr": "", "stderr_lines": [], "stdout": "0rtx3q.6kvwllj1akk2polb", "stdout_lines": ["0rtx3q.6kvwllj1akk2polb"]}
TASK [kubernetes/kubeadm : gets the kubeadm version] *****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.341) 0:03:08.708 *******
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "version", "-o", "short"], "delta": "0:00:00.019003", "end": "2019-01-29 13:12:51.146015", "rc": 0, "start": "2019-01-29 13:12:51.127012", "stderr": "", "stderr_lines": [], "stdout": "v1.13.2", "stdout_lines": ["v1.13.2"]}
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha1] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.382) 0:03:09.090 *******
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha2] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.055) 0:03:09.145 *******
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha3] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.054) 0:03:09.200 *******
TASK [kubernetes/kubeadm : sets kubeadm api version to v1beta1] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.063) 0:03:09.263 *******
ok: [monstrinho] => {"ansible_facts": {"kubeadmConfig_api_version": "v1beta1"}, "changed": false}
TASK [kubernetes/kubeadm : Create kubeadm client config] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.129) 0:03:09.392 *******
TASK [kubernetes/kubeadm : Join to cluster if needed] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.055) 0:03:09.447 *******
TASK [kubernetes/kubeadm : Wait for kubelet bootstrap to create config] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.053) 0:03:09.501 *******
ok: [monstrinho] => {"changed": false, "elapsed": 1, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/kubernetes/kubelet.conf", "port": null, "search_regex": null, "size": 5488, "state": "file", "uid": 0}
TASK [kubernetes/kubeadm : Update server field in kubelet kubeconfig] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:01.560) 0:03:11.062 *******
TASK [kubernetes/kubeadm : Symlink kubelet kubeconfig for calico/canal] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.072) 0:03:11.134 *******
ok: [monstrinho] => {"changed": false, "dest": "/etc/kubernetes/node-kubeconfig.yaml", "gid": 0, "group": "root", "mode": "0777", "owner": "root", "size": 28, "src": "/etc/kubernetes/kubelet.conf", "state": "link", "uid": 0}
TASK [kubernetes/kubeadm : Delete kube-proxy daemonset if kube_proxy_remove set, e.g. kube_network_plugin providing proxy services] **********************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.406) 0:03:11.541 *******
TASK [network_plugin/cilium : Cilium | Ensure BFPFS mounted] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.052) 0:03:11.593 *******
TASK [network_plugin/cilium : Cilium | Create Cilium certs directory] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.052) 0:03:11.646 *******
TASK [network_plugin/cilium : Cilium | Link etcd certificates for cilium] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.051) 0:03:11.698 *******
TASK [network_plugin/cilium : Cilium | Create Cilium node manifests] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.072) 0:03:11.771 *******
TASK [network_plugin/cilium : Cilium | Set CNI directory permissions] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.084) 0:03:11.855 *******
TASK [network_plugin/cilium : Cilium | Create network policy directory] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.051) 0:03:11.907 *******
TASK [network_plugin/calico : include_tasks] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.051) 0:03:11.958 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/check.yml for monstrinho
TASK [network_plugin/calico : Check vars defined correctly] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.100) 0:03:12.059 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [network_plugin/calico : Get current version of calico cluster version] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.159) 0:03:12.218 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl version | grep 'Cluster Version:' | awk '{ print $3}'", "delta": "0:00:02.216940", "end": "2019-01-29 13:12:56.884814", "rc": 0, "start": "2019-01-29 13:12:54.667874", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "v3.1.3", "stdout_lines": ["v3.1.3"]}
TASK [network_plugin/calico : Check that calico version is enough for upgrade] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:55 -0200 (0:00:02.616) 0:03:14.835 *******
ok: [monstrinho] => {
"changed": false,
"msg": "All assertions passed"
}
TASK [network_plugin/calico : Set upgrade flag when version needs to be updated] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.143) 0:03:14.979 *******
TASK [network_plugin/calico : include_tasks] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.061) 0:03:15.040 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/pre.yml for monstrinho
TASK [network_plugin/calico : Calico | Disable calico-node service if it exists] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.084) 0:03:15.124 *******
ok: [monstrinho] => {"changed": false, "failed_when_result": false, "msg": "Could not find the requested service calico-node: host"}
TASK [network_plugin/calico : Calico | Get kubelet hostname] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.439) 0:03:15.564 *******
TASK [network_plugin/calico : Download calico-upgrade tool (force version)] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.081) 0:03:15.645 *******
TASK [network_plugin/calico : Create etcdv2 and etcdv3 calicoApiConfig] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.078) 0:03:15.723 *******
TASK [network_plugin/calico : Tests data migration (dry-run)] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.088) 0:03:15.812 *******
TASK [network_plugin/calico : If test migration is success continue with calico data real migration] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.078) 0:03:15.891 *******
TASK [network_plugin/calico : include_tasks] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.054) 0:03:15.945 *******
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/install.yml for monstrinho
TASK [network_plugin/calico : Calico | Write Calico cni config] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.146) 0:03:16.092 *******
ok: [monstrinho] => {"changed": false, "checksum": "8a2188cd8afa74d2810e3f0fcdf47a5b0b3e8612", "dest": "/etc/cni/net.d/10-calico.conflist", "gid": 0, "group": "root", "mode": "0644", "owner": "kube", "path": "/etc/cni/net.d/10-calico.conflist", "size": 763, "state": "file", "uid": 999}
TASK [network_plugin/calico : Calico | Create calico certs directory] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.653) 0:03:16.745 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/etc/calico/certs", "size": 5, "state": "directory", "uid": 0}
TASK [network_plugin/calico : Calico | Link etcd certificates for calico-node] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:58 -0200 (0:00:00.383) 0:03:17.129 *******
ok: [monstrinho] => (item={u's': u'ca.pem', u'd': u'ca_cert.crt'}) => {"changed": false, "dest": "/etc/calico/certs/ca_cert.crt", "gid": 0, "group": "root", "item": {"d": "ca_cert.crt", "s": "ca.pem"}, "mode": "0640", "owner": "kube", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "hard", "uid": 999}
ok: [monstrinho] => (item={u's': u'node-monstrinho.pem', u'd': u'cert.crt'}) => {"changed": false, "dest": "/etc/calico/certs/cert.crt", "gid": 0, "group": "root", "item": {"d": "cert.crt", "s": "node-monstrinho.pem"}, "mode": "0640", "owner": "kube", "size": 1371, "src": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "state": "hard", "uid": 999}
ok: [monstrinho] => (item={u's': u'node-monstrinho-key.pem', u'd': u'key.pem'}) => {"changed": false, "dest": "/etc/calico/certs/key.pem", "gid": 0, "group": "root", "item": {"d": "key.pem", "s": "node-monstrinho-key.pem"}, "mode": "0640", "owner": "kube", "size": 1675, "src": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "state": "hard", "uid": 999}
TASK [network_plugin/calico : Calico | Install calicoctl container script] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:58 -0200 (0:00:00.643) 0:03:17.772 *******
ok: [monstrinho] => {"changed": false, "checksum": "22393c2aefba8fe8d920ddc4b3d40559e4a0c37f", "dest": "/usr/local/bin/calicoctl", "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/calicoctl", "size": 497, "state": "file", "uid": 0}
TASK [network_plugin/calico : Calico | Set cni directory permissions] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:12:59 -0200 (0:00:00.650) 0:03:18.423 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 16, "state": "directory", "uid": 999}
TASK [network_plugin/calico : Calico | Copy cni plugins] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:00 -0200 (0:00:00.455) 0:03:18.878 *******
changed: [monstrinho] => {"changed": true, "dest": "/opt/cni/bin", "extract_results": {"cmd": ["/bin/tar", "--extract", "-C", "/opt/cni/bin", "-z", "-f", "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz"], "err": "", "out": "", "rc": 0}, "gid": 0, "group": "root", "handler": "TgzArchive", "mode": "0755", "owner": "root", "size": 16, "src": "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz", "state": "directory", "uid": 0}
TASK [network_plugin/calico : Calico | Copy cni plugins from calico/cni container] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:01 -0200 (0:00:01.848) 0:03:20.726 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "quay.io/calico/cni:v3.1.3", "sh", "-c", "cp /opt/cni/bin/* /cnibindir/"], "delta": "0:00:05.394388", "end": "2019-01-29 13:13:08.546716", "rc": 0, "start": "2019-01-29 13:13:03.152328", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [network_plugin/calico : Calico | wait for etcd] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:07 -0200 (0:00:05.763) 0:03:26.490 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "18", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:13:09 GMT", "json": {"health": "true"}, "msg": "OK (18 bytes)", "redirected": false, "status": 200, "url": "https://10.0.1.2:2379/health"}
TASK [network_plugin/calico : Calico | Check if calico network pool has already been configured] *********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:08 -0200 (0:00:00.568) 0:03:27.058 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl get ippool | grep -w \"10.233.64.0/18\" | wc -l", "delta": "0:00:02.207277", "end": "2019-01-29 13:13:11.605987", "rc": 0, "start": "2019-01-29 13:13:09.398710", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "1", "stdout_lines": ["1"]}
TASK [network_plugin/calico : Calico | Configure calico network pool] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:10 -0200 (0:00:02.512) 0:03:29.571 *******
TASK [network_plugin/calico : Calico | Configure calico network pool (legacy)] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.078) 0:03:29.650 *******
TASK [network_plugin/calico : Determine nodeToNodeMesh needed state] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.052) 0:03:29.702 *******
TASK [network_plugin/calico : Calico | Set global as_num] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.076) 0:03:29.779 *******
changed: [monstrinho -> None] => {"changed": true, "cmd": "echo ' { \"kind\": \"BGPConfiguration\", \"apiVersion\": \"projectcalico.org/v3\", \"metadata\": {\n\"name\": \"default\",\n}, \"spec\": {\n\"logSeverityScreen\": \"Info\",\n\"nodeToNodeMeshEnabled\": true ,\n\"asNumber\": 64512 }} ' | /usr/local/bin/calicoctl create --skip-exists -f -", "delta": "0:00:02.251277", "end": "2019-01-29 13:13:14.410183", "rc": 0, "start": "2019-01-29 13:13:12.158906", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "Successfully created 1 'BGPConfiguration' resource(s)", "stdout_lines": ["Successfully created 1 'BGPConfiguration' resource(s)"]}
TASK [network_plugin/calico : Calico | Set global as_num (legacy)] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:02.565) 0:03:32.345 *******
TASK [network_plugin/calico : Calico | Disable node mesh (legacy)] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.401 *******
TASK [network_plugin/calico : Calico | Configure node asNumber for per node peering] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.055) 0:03:32.457 *******
TASK [network_plugin/calico : Calico | Configure node asNumber for per node peering (legacy)] ************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.058) 0:03:32.515 *******
TASK [network_plugin/calico : Calico | Configure peering with router(s) at node scope] *******************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.053) 0:03:32.569 *******
TASK [network_plugin/calico : Calico | Configure peering with router(s) at node scope (legacy)] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.064) 0:03:32.633 *******
TASK [network_plugin/calico : Calico | Configure peering with router(s) at global scope] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.690 *******
TASK [network_plugin/calico : Calico | Configure peering with router(s) at global scope (legacy)] ********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.746 *******
TASK [network_plugin/calico : Calico | Configure peering with route reflectors] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.059) 0:03:32.806 *******
TASK [network_plugin/calico : Calico | Configure peering with route reflectors (legacy)] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.046) 0:03:32.852 *******
TASK [network_plugin/calico : Calico | Create calico manifests] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:14 -0200 (0:00:00.045) 0:03:32.897 *******
ok: [monstrinho] => (item={u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}) => {"changed": false, "checksum": "8246dc1c482dba4f6d519a952af8522a21923853", "dest": "/etc/kubernetes/calico-config.yml", "gid": 0, "group": "root", "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-config.yml", "size": 312, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}) => {"changed": false, "checksum": "d50b4764822c60d08ba78a8c497cfc929d1634e2", "dest": "/etc/kubernetes/calico-node.yml", "gid": 0, "group": "root", "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node.yml", "size": 6887, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}) => {"changed": false, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node-sa.yml", "size": 147, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}) => {"changed": false, "checksum": "8d6255e0c0cb2959a0628fae6c8ddcb1ba833fa3", "dest": "/etc/kubernetes/calico-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-cr.yml", "size": 341, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}) => {"changed": false, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-crb.yml", "size": 270, "state": "file", "uid": 0}
TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy flannel systemd unit file] *************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:04.241) 0:03:37.139 *******
TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy Flannel static pod manifest] ***********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.060) 0:03:37.199 *******
TASK [network_plugin/flannel : Flannel pre-upgrade | Remove Flannel's certificate directory not required by CNI] *****************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.054) 0:03:37.253 *******
TASK [network_plugin/flannel : Flannel | Create Flannel manifests] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.053) 0:03:37.307 *******
TASK [network_plugin/weave : Weave | Set cni directory permissions] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.065) 0:03:37.373 *******
TASK [network_plugin/weave : Weave | Copy cni plugins] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.053) 0:03:37.427 *******
TASK [network_plugin/weave : Weave | Create manifest] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.052) 0:03:37.479 *******
TASK [network_plugin/weave : Weave | Fix nodePort for Weave] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.048) 0:03:37.528 *******
TASK [network_plugin/canal : Canal | Write Canal cni config] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.059) 0:03:37.588 *******
TASK [network_plugin/canal : Canal | Create canal certs directory] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.049) 0:03:37.637 *******
TASK [network_plugin/canal : Canal | Link etcd certificates for canal-node] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.052) 0:03:37.690 *******
TASK [network_plugin/canal : Canal | Set Flannel etcd configuration] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.132) 0:03:37.822 *******
TASK [network_plugin/canal : Canal | Create canal node manifests] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.056) 0:03:37.879 *******
TASK [network_plugin/canal : Canal | Set cni directory permissions] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.104) 0:03:37.983 *******
TASK [network_plugin/canal : Canal | Copy cni plugins] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.050) 0:03:38.034 *******
TASK [network_plugin/canal : Canal | Copy cni plugins from calico/cni] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.084 *******
TASK [network_plugin/canal : Canal | Set cni directory permissions] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.133 *******
TASK [network_plugin/canal : Canal | Install calicoctl container script] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.052) 0:03:38.186 *******
TASK [network_plugin/canal : Canal | Create network policy directory] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.064) 0:03:38.250 *******
TASK [network_plugin/contiv : Contiv | Load openvswitch kernel module] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.053) 0:03:38.304 *******
TASK [network_plugin/contiv : Contiv | Create contiv etcd directories] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.053) 0:03:38.358 *******
TASK [network_plugin/contiv : Contiv | Workaround https://github.com/contiv/netplugin/issues/1152] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.062) 0:03:38.420 *******
TASK [network_plugin/contiv : Contiv | Set necessary facts] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.051) 0:03:38.471 *******
TASK [network_plugin/contiv : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.054) 0:03:38.525 *******
TASK [network_plugin/contiv : Contiv | Create /var/contiv] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.575 *******
TASK [network_plugin/contiv : Contiv | Create contiv config directory] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.052) 0:03:38.627 *******
TASK [network_plugin/contiv : Contiv | Install all Kubernetes resources] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.677 *******
TASK [network_plugin/contiv : Contiv | Copy certs generation script] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.072) 0:03:38.749 *******
TASK [network_plugin/contiv : Contiv | Check for cert key existence] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.087) 0:03:38.837 *******
TASK [network_plugin/contiv : Contiv | Generate contiv-api-proxy certificates] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.073) 0:03:38.910 *******
TASK [network_plugin/contiv : Contiv | Fetch the generated certificate] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.078) 0:03:38.988 *******
TASK [network_plugin/contiv : Contiv | Copy the generated certificate on nodes] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.064) 0:03:39.052 *******
TASK [network_plugin/contiv : Contiv | Set cni directory permissions] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.063) 0:03:39.116 *******
TASK [network_plugin/contiv : Contiv | Copy cni plugins] *************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.055) 0:03:39.171 *******
TASK [network_plugin/contiv : Contiv | Copy netctl binary from docker container] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.051) 0:03:39.223 *******
TASK [network_plugin/kube-router : kube-router | Add annotations on kube-master] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.053) 0:03:39.276 *******
TASK [network_plugin/kube-router : kube-router | Add annotations on kube-node] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.067) 0:03:39.343 *******
TASK [network_plugin/kube-router : kube-router | Add common annotations on all servers] ******************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.048) 0:03:39.391 *******
TASK [network_plugin/kube-router : kube-roter | Set cni directory permissions] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.049) 0:03:39.441 *******
TASK [network_plugin/kube-router : kube-router | Copy cni plugins] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.493 *******
TASK [network_plugin/kube-router : kube-router | Create manifest] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.050) 0:03:39.543 *******
TASK [network_plugin/cloud : Cloud | Set cni directory permissions] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.595 *******
TASK [network_plugin/cloud : Canal | Copy cni plugins] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.648 *******
TASK [network_plugin/multus : Multus | Copy manifest files] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.051) 0:03:39.699 *******
TASK [network_plugin/multus : Multus | Copy manifest templates] ******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.080) 0:03:39.779 *******
PLAY [kube-master[0]] ************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.067) 0:03:39.847 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:21 -0200 (0:00:00.051) 0:03:39.899 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:21 -0200 (0:00:00.520) 0:03:40.419 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.506) 0:03:40.925 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.051) 0:03:40.977 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token name] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.127) 0:03:41.104 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get secrets -o custom-columns=name:{.metadata.name} --no-headers | grep -m1 default-token", "delta": "0:00:00.100540", "end": "2019-01-29 13:13:23.536631", "rc": 0, "start": "2019-01-29 13:13:23.436091", "stderr": "", "stderr_lines": [], "stdout": "default-token-hj59b", "stdout_lines": ["default-token-hj59b"]}
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token data] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.356) 0:03:41.461 *******
ok: [monstrinho] => {"changed": false, "cmd": ["/usr/local/bin/kubectl", "--kubeconfig", "/etc/kubernetes/admin.conf", "get", "secrets", "default-token-hj59b", "-ojson"], "delta": "0:00:00.080401", "end": "2019-01-29 13:13:23.845743", "rc": 0, "start": "2019-01-29 13:13:23.765342", "stderr": "", "stderr_lines": [], "stdout": "{\n \"apiVersion\": \"v1\",\n \"data\": {\n \"ca.crt\": \"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\",\n \"namespace\": \"ZGVmYXVsdA==\",\n \"token\": \"ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNklpSjkuZXlKcGMzTWlPaUpyZFdKbGNtNWxkR1Z6TDNObGNuWnBZMlZoWTJOdmRXNTBJaXdpYTNWaVpYSnVaWFJsY3k1cGJ5OXpaWEoyYVdObFlXTmpiM1Z1ZEM5dVlXMWxjM0JoWTJVaU9pSmtaV1poZFd4MElpd2lhM1ZpWlhKdVpYUmxjeTVwYnk5elpYSjJhV05sWVdOamIzVnVkQzl6WldOeVpYUXVibUZ0WlNJNkltUmxabUYxYkhRdGRHOXJaVzR0YUdvMU9XSWlMQ0pyZFdKbGNtNWxkR1Z6TG1sdkwzTmxjblpwWTJWaFkyTnZkVzUwTDNObGNuWnBZMlV0WVdOamIzVnVkQzV1WVcxbElqb2laR1ZtWVhWc2RDSXNJbXQxWW1WeWJtVjBaWE11YVc4dmMyVnlkbWxqWldGalkyOTFiblF2YzJWeWRtbGpaUzFoWTJOdmRXNTBMblZwWkNJNklqaGtaVGszTnpkbExUSXlZak10TVRGbE9TMDRNekl5TFRjd09EVmpNak14T0dZMU1DSXNJbk4xWWlJNkluTjVjM1JsYlRwelpYSjJhV05sWVdOamIzVnVkRHBrWldaaGRXeDBPbVJsWm1GMWJIUWlmUS5SZG5uRTFiaHdiM2JVdjhiSHFmRmJiS2JwLUNFTFBRay1vMUZUWGpScUFONFROc3p1dFlOeXJLVlV1YVhSdHduRGkyLU0zTmVQYkdlQ0w4bEVrUlBlV2RLQklTWjcwM2pyLTVQZ1l6bzBJeGZ1alM0czN0eDlESHlwdmlELTdGZ0o4Z0NxNGVhenNXSEtIdHBBX2dOYldfay13dnBYQUpHNE9SZkFCUVhIMFB3cHNCd1MtZmJHcXZzMnNYajdqZFZRTTBrOWMzejk3NUdNV2ZKbEhscHQyaU9VdE54SkF5VHZJNURBYWdSVDRVa25QSTRlUlpsanRqUnMwUlNFaWpfS252NTBlTG1VcG5UWVYxQ1ZnTUsxWno0VlhkMy1WUFNGSGpiTGx2eUh6U3BCNTIyd1d1UEJMMnA5TEZCOFJYMXBkNzhXU001ZWFuVEFOVmwtd0FkM0E=\"\n },\n \"kind\": \"Secret\",\n \"metadata\": {\n \"annotations\": {\n \"kubernetes.io/service-account.name\": \"default\",\n \"kubernetes.io/service-account.uid\": \"8de9777e-22b3-11e9-8322-7085c2318f50\"\n },\n \"creationTimestamp\": \"2019-01-29T14:49:11Z\",\n \"name\": \"default-token-hj59b\",\n \"namespace\": \"default\",\n \"resourceVersion\": \"51054\",\n \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hj59b\",\n \"uid\": \"0a0254fe-23d5-11e9-abfe-7085c2318f50\"\n },\n \"type\": \"kubernetes.io/service-account-token\"\n}", "stdout_lines": ["{", " \"apiVersion\": \"v1\",", " \"data\": {", " \"ca.crt\": \"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\",", " \"namespace\": \"ZGVmYXVsdA==\",", " \"token\": \"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\"", " },", " \"kind\": \"Secret\",", " \"metadata\": {", " \"annotations\": {", " \"kubernetes.io/service-account.name\": \"default\",", " \"kubernetes.io/service-account.uid\": \"8de9777e-22b3-11e9-8322-7085c2318f50\"", " },", " \"creationTimestamp\": \"2019-01-29T14:49:11Z\",", " \"name\": \"default-token-hj59b\",", " \"namespace\": \"default\",", " \"resourceVersion\": \"51054\",", " \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hj59b\",", " \"uid\": \"0a0254fe-23d5-11e9-abfe-7085c2318f50\"", " },", " \"type\": \"kubernetes.io/service-account-token\"", "}"]}
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Test if default certificate is expired] ************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.305) 0:03:41.767 *******
ok: [monstrinho] => {"changed": false, "connection": "close", "content": "{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"nodes is forbidden: User \\\"system:serviceaccount:default:default\\\" cannot list resource \\\"nodes\\\" in API group \\\"\\\" at the cluster scope\",\"reason\":\"Forbidden\",\"details\":{\"kind\":\"nodes\"},\"code\":403}\n", "content_length": "277", "content_type": "application/json", "date": "Tue, 29 Jan 2019 15:13:24 GMT", "failed_when_result": false, "json": {"apiVersion": "v1", "code": 403, "details": {"kind": "nodes"}, "kind": "Status", "message": "nodes is forbidden: User \"system:serviceaccount:default:default\" cannot list resource \"nodes\" in API group \"\" at the cluster scope", "metadata": {}, "reason": "Forbidden", "status": "Failure"}, "msg": "Status code was 403 and not [200]: HTTP Error 403: Forbidden", "redirected": false, "status": 403, "url": "https://10.233.0.1/api/v1/nodes", "x_content_type_options": "nosniff"}
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Determine if certificate is expired] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.454) 0:03:42.221 *******
ok: [monstrinho] => {"ansible_facts": {"needs_rotation": false}, "changed": false}
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get all serviceaccount tokens to expire] ***********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.134) 0:03:42.356 *******
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete expired tokens] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.051) 0:03:42.407 *******
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete pods in system namespace] *******************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.055) 0:03:42.463 *******
TASK [win_nodes/kubernetes_patch : Ensure that user manifests directory exists] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.052) 0:03:42.515 *******
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/kube-manifests/kubernetes", "size": 2, "state": "directory", "uid": 0}
TASK [win_nodes/kubernetes_patch : Copy kube-proxy daemonset hostnameOverride patch] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.239) 0:03:42.754 *******
ok: [monstrinho] => {"changed": false, "checksum": "705b8362a76969e679cdc1f774f3cd704a2e73d7", "dest": "/root/kube-manifests/hostnameOverride-patch.json", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/root/kube-manifests/hostnameOverride-patch.json", "size": 537, "state": "file", "uid": 0}
TASK [win_nodes/kubernetes_patch : Check current command for kube-proxy daemonset] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:24 -0200 (0:00:00.467) 0:03:43.222 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get ds kube-proxy --namespace=kube-system -o jsonpath='{.spec.template.spec.containers[0].command}'", "delta": "0:00:00.100370", "end": "2019-01-29 13:13:25.652862", "rc": 0, "start": "2019-01-29 13:13:25.552492", "stderr": "", "stderr_lines": [], "stdout": "[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME) --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME}]", "stdout_lines": ["[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME) --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME}]"]}
TASK [win_nodes/kubernetes_patch : Apply hostnameOverride patch for kube-proxy daemonset] ****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:24 -0200 (0:00:00.349) 0:03:43.572 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf patch ds kube-proxy --namespace=kube-system --type=json -p \"$(cat hostnameOverride-patch.json)\"", "delta": "0:00:00.132416", "end": "2019-01-29 13:13:26.039656", "rc": 0, "start": "2019-01-29 13:13:25.907240", "stderr": "", "stderr_lines": [], "stdout": "daemonset.extensions/kube-proxy patched", "stdout_lines": ["daemonset.extensions/kube-proxy patched"]}
TASK [win_nodes/kubernetes_patch : debug] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.395) 0:03:43.968 *******
ok: [monstrinho] => {
"msg": [
"daemonset.extensions/kube-proxy patched"
]
}
TASK [win_nodes/kubernetes_patch : debug] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.132) 0:03:44.100 *******
ok: [monstrinho] => {
"msg": []
}
TASK [win_nodes/kubernetes_patch : Copy kube-proxy daemonset nodeselector patch] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.134) 0:03:44.234 *******
ok: [monstrinho] => {"changed": false, "checksum": "7a623f3b1dbed6c45b190d209c0ff765511fe176", "dest": "/root/kube-manifests/nodeselector-os-linux-patch.json", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/root/kube-manifests/nodeselector-os-linux-patch.json", "size": 81, "state": "file", "uid": 0}
TASK [win_nodes/kubernetes_patch : Check current nodeselector for kube-proxy daemonset] ******************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.556) 0:03:44.791 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get ds kube-proxy --namespace=kube-system -o jsonpath='{.spec.template.spec.nodeSelector.beta.kubernetes.io/os}'", "delta": "0:00:00.082311", "end": "2019-01-29 13:13:27.240546", "rc": 0, "start": "2019-01-29 13:13:27.158235", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []}
TASK [win_nodes/kubernetes_patch : Apply nodeselector patch for kube-proxy daemonset] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.371) 0:03:45.163 *******
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf patch ds kube-proxy --namespace=kube-system --type=strategic -p \"$(cat nodeselector-os-linux-patch.json)\"", "delta": "0:00:00.148365", "end": "2019-01-29 13:13:27.626430", "rc": 0, "start": "2019-01-29 13:13:27.478065", "stderr": "", "stderr_lines": [], "stdout": "daemonset.extensions/kube-proxy patched (no change)", "stdout_lines": ["daemonset.extensions/kube-proxy patched (no change)"]}
TASK [win_nodes/kubernetes_patch : debug] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.407) 0:03:45.571 *******
ok: [monstrinho] => {
"msg": [
"daemonset.extensions/kube-proxy patched (no change)"
]
}
TASK [win_nodes/kubernetes_patch : debug] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.129) 0:03:45.700 *******
ok: [monstrinho] => {
"msg": []
}
PLAY [kube-master] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.149) 0:03:45.849 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:27 -0200 (0:00:00.051) 0:03:45.901 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:27 -0200 (0:00:00.518) 0:03:46.420 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.501) 0:03:46.921 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.051) 0:03:46.972 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes-apps/network_plugin/cilium : Cilium | Start Resources] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.123) 0:03:47.096 *******
TASK [kubernetes-apps/network_plugin/cilium : Cilium | Wait for pods to run] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.086) 0:03:47.183 *******
TASK [kubernetes-apps/network_plugin/calico : Start Calico resources] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.050) 0:03:47.233 *******
ok: [monstrinho] => (item=calico-config.yml) => {"changed": false, "item": {"changed": false, "checksum": "8246dc1c482dba4f6d519a952af8522a21923853", "dest": "/etc/kubernetes/calico-config.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-config.yml"}, "before": {"path": "/etc/kubernetes/calico-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-config.yml", "size": 312, "state": "file", "uid": 0}, "msg": "success: configmap/calico-config unchanged"}
ok: [monstrinho] => (item=calico-node.yml) => {"changed": false, "item": {"changed": false, "checksum": "d50b4764822c60d08ba78a8c497cfc929d1634e2", "dest": "/etc/kubernetes/calico-node.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-node.yml"}, "before": {"path": "/etc/kubernetes/calico-node.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-node.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-node.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node.yml", "size": 6887, "state": "file", "uid": 0}, "msg": "success: daemonset.extensions/calico-node configured"}
ok: [monstrinho] => (item=calico-node-sa.yml) => {"changed": false, "item": {"changed": false, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-node-sa.yml"}, "before": {"path": "/etc/kubernetes/calico-node-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-node-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-node-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node-sa.yml", "size": 147, "state": "file", "uid": 0}, "msg": "success: serviceaccount/calico-node unchanged"}
ok: [monstrinho] => (item=calico-cr.yml) => {"changed": false, "item": {"changed": false, "checksum": "8d6255e0c0cb2959a0628fae6c8ddcb1ba833fa3", "dest": "/etc/kubernetes/calico-cr.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-cr.yml"}, "before": {"path": "/etc/kubernetes/calico-cr.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-cr.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-cr.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-cr.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-cr.yml", "size": 341, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/calico-node unchanged"}
ok: [monstrinho] => (item=calico-crb.yml) => {"changed": false, "item": {"changed": false, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-crb.yml"}, "before": {"path": "/etc/kubernetes/calico-crb.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-crb.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-crb.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-crb.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-crb.yml", "size": 270, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/calico-node unchanged"}
TASK [kubernetes-apps/network_plugin/calico : calico upgrade complete] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:03.689) 0:03:50.923 *******
TASK [kubernetes-apps/network_plugin/canal : Canal | Start Resources] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.059) 0:03:50.982 *******
TASK [kubernetes-apps/network_plugin/flannel : Flannel | Start Resources] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.104) 0:03:51.087 *******
TASK [kubernetes-apps/network_plugin/flannel : Flannel | Wait for flannel subnet.env file presence] ******************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.064) 0:03:51.151 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create Kubernetes resources] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.049) 0:03:51.201 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Wait for netmaster] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.253 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get global configuration] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.307 *******
TASK [kubernetes-apps/network_plugin/contiv : set_fact] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.049) 0:03:51.356 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global forwarding mode] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.061) 0:03:51.418 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global fabric mode] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.471 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set peer hostname] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.050) 0:03:51.521 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get BGP configuration] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.058) 0:03:51.580 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Configure peering with router(s)] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.054) 0:03:51.635 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get existing networks] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.055) 0:03:51.690 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create networks] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.743 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Check if default group exists] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.796 *******
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create default group] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.849 *******
TASK [kubernetes-apps/network_plugin/weave : Weave | Start Resources] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.052) 0:03:51.902 *******
TASK [kubernetes-apps/network_plugin/weave : Weave | Wait for Weave to become available] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.051) 0:03:51.953 *******
TASK [kubernetes-apps/network_plugin/kube-router : kube-router | Start Resources] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.063) 0:03:52.017 *******
TASK [kubernetes-apps/network_plugin/kube-router : kube-router | Wait for kube-router pods to be ready] **************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.051) 0:03:52.069 *******
TASK [kubernetes-apps/network_plugin/multus : Multus | Start resources] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.049) 0:03:52.118 *******
TASK [policy_controller/calico : Set cert dir] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.083) 0:03:52.202 *******
TASK [policy_controller/calico : Create calico-kube-controllers manifests] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.059) 0:03:52.261 *******
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'calico-kube-controllers', u'file': u'calico-kube-controllers.yml'}) => {"changed": false, "checksum": "14ced9cb1d4a926c838be5a793c5e0a5cf3ec3cf", "dest": "/etc/kubernetes/calico-kube-controllers.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-controllers.yml", "name": "calico-kube-controllers", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-controllers.yml", "size": 1650, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'calico-kube-controllers', u'file': u'calico-kube-sa.yml'}) => {"changed": false, "checksum": "9b599bf59cbdd85628410da40ac05a01f7985d1b", "dest": "/etc/kubernetes/calico-kube-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-sa.yml", "name": "calico-kube-controllers", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-sa.yml", "size": 159, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'calico-kube-controllers', u'file': u'calico-kube-cr.yml'}) => {"changed": false, "checksum": "328b854512a0ae28be6492554a7fa187e5e5cc14", "dest": "/etc/kubernetes/calico-kube-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-cr.yml", "name": "calico-kube-controllers", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-cr.yml", "size": 446, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'calico-kube-controllers', u'file': u'calico-kube-crb.yml'}) => {"changed": false, "checksum": "a0ab18747c1c4701bf329d27e1442e006709c1fb", "dest": "/etc/kubernetes/calico-kube-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-crb.yml", "name": "calico-kube-controllers", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-crb.yml", "size": 306, "state": "file", "uid": 0}
TASK [policy_controller/calico : Start of Calico kube controllers] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:35 -0200 (0:00:01.888) 0:03:54.150 *******
ok: [monstrinho] => (item=calico-kube-controllers.yml) => {"changed": false, "item": {"changed": false, "checksum": "14ced9cb1d4a926c838be5a793c5e0a5cf3ec3cf", "dest": "/etc/kubernetes/calico-kube-controllers.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-controllers.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-controllers.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-controllers.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-controllers.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-controllers.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-controllers.yml", "name": "calico-kube-controllers", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-controllers.yml", "size": 1650, "state": "file", "uid": 0}, "msg": "success: deployment.apps/calico-kube-controllers configured"}
ok: [monstrinho] => (item=calico-kube-sa.yml) => {"changed": false, "item": {"changed": false, "checksum": "9b599bf59cbdd85628410da40ac05a01f7985d1b", "dest": "/etc/kubernetes/calico-kube-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-sa.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-sa.yml", "name": "calico-kube-controllers", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-sa.yml", "size": 159, "state": "file", "uid": 0}, "msg": "success: serviceaccount/calico-kube-controllers unchanged"}
ok: [monstrinho] => (item=calico-kube-cr.yml) => {"changed": false, "item": {"changed": false, "checksum": "328b854512a0ae28be6492554a7fa187e5e5cc14", "dest": "/etc/kubernetes/calico-kube-cr.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-cr.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-cr.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-cr.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-cr.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-cr.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-cr.yml", "name": "calico-kube-controllers", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-cr.yml", "size": 446, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/calico-kube-controllers unchanged"}
ok: [monstrinho] => (item=calico-kube-crb.yml) => {"changed": false, "item": {"changed": false, "checksum": "a0ab18747c1c4701bf329d27e1442e006709c1fb", "dest": "/etc/kubernetes/calico-kube-crb.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-crb.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-crb.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-crb.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-crb.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-crb.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-crb.yml", "name": "calico-kube-controllers", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-crb.yml", "size": 306, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/calico-kube-controllers unchanged"}
TASK [policy_controller/calico : Set cert dir] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:02.166) 0:03:56.316 *******
TASK [policy_controller/calico : Create calico-kube-controllers manifests] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.054) 0:03:56.370 *******
TASK [policy_controller/calico : Start of Calico kube controllers] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.078) 0:03:56.449 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy addon dir and manifests] *******************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.077) 0:03:56.526 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy namespace] *********************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.575 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create addon dir] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.623 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Templates list] ******************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.047) 0:03:56.671 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Append extra templates to NGINX Ingress Templates list for PodSecurityPolicy] ****************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.719 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create manifests] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.768 *******
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Apply manifests] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.052) 0:03:56.821 *******
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy addon dir and manifests] ********************************************************************************************************************************
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.049) 0:03:56.871 *******
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy namespace] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.051) 0:03:56.922 *******
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create addon dir] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:56.971 *******
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create manifests] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.046) 0:03:57.018 *******
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Apply manifests] ******************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.096) 0:03:57.114 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Ensure base dir is created on all hosts] ****************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.128) 0:03:57.243 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create addon dir] ***************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.055) 0:03:57.298 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Templates list] *****************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.347 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Insert extra templates to Local Volume Provisioner templates list for PodSecurityPolicy] ****************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.049) 0:03:57.397 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create manifests] ***************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.047) 0:03:57.444 *******
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Apply manifests] ****************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.049) 0:03:57.494 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy addon dir and manifests] ******************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.062) 0:03:57.556 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy namespace] ********************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.604 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy storageclass] *****************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.653 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create addon dir] ***************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.701 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Templates list] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.750 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Append extra templates to CephFS Provisioner Templates list for PodSecurityPolicy] **********************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.798 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create manifests] ***************************************************************************************************************************************
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.047) 0:03:57.846 *******
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Apply manifests] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.049) 0:03:57.895 *******
PLAY [calico-rr] *****************************************************************************************************************************************************************************************************************************
skipping: no hosts matched
PLAY [k8s-cluster] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.096) 0:03:57.991 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.050) 0:03:58.042 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.628) 0:03:58.670 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.624) 0:03:59.295 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.052) 0:03:59.347 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [dnsmasq : ensure dnsmasq.d directory exists] *******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.256) 0:03:59.604 *******
TASK [dnsmasq : ensure dnsmasq.d-available directory exists] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.053) 0:03:59.658 *******
TASK [dnsmasq : check system nameservers] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.049) 0:03:59.707 *******
TASK [dnsmasq : init system_and_upstream_dns_servers] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.054) 0:03:59.762 *******
TASK [dnsmasq : combine upstream_dns_servers and system nameservers (only for docker_dns)] ***************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.048) 0:03:59.810 *******
TASK [dnsmasq : Write dnsmasq configuration] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.056) 0:03:59.867 *******
TASK [dnsmasq : Stat dnsmasq link] ***********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.250) 0:04:00.117 *******
TASK [dnsmasq : Stat dnsmasq link] ***********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.054) 0:04:00.171 *******
TASK [dnsmasq : Move previous configuration] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.220 *******
TASK [dnsmasq : Enable dnsmasq configuration] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.050) 0:04:00.271 *******
TASK [dnsmasq : Create dnsmasq RBAC manifests] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.074) 0:04:00.345 *******
TASK [dnsmasq : Apply dnsmasq RBAC manifests] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.087) 0:04:00.433 *******
TASK [dnsmasq : Create dnsmasq manifests] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.083) 0:04:00.516 *******
TASK [dnsmasq : Start Resources] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.110) 0:04:00.626 *******
TASK [dnsmasq : Check for dnsmasq port (pulling image and running container)] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.071) 0:04:00.698 *******
TASK [adduser : User | Create User Group] ****************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.748 *******
TASK [adduser : User | Create User] **********************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.797 *******
TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.052) 0:04:00.850 *******
TASK [kubernetes/preinstall : Disable swap] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.060) 0:04:00.911 *******
TASK [kubernetes/preinstall : Stop if ansible version is too low] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:00.961 *******
TASK [kubernetes/preinstall : Stop if either kube-master, kube-node or etcd is empty] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.011 *******
TASK [kubernetes/preinstall : Stop if non systemd OS type] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.068) 0:04:01.080 *******
TASK [kubernetes/preinstall : Stop if unknown OS] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.131 *******
TASK [kubernetes/preinstall : Stop if unknown network plugin] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.064) 0:04:01.195 *******
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.051) 0:04:01.246 *******
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ***********************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.053) 0:04:01.299 *******
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.088) 0:04:01.388 *******
TASK [kubernetes/preinstall : Stop if memory is too small for masters] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.438 *******
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.488 *******
TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.537 *******
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.587 *******
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.638 *******
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.688 *******
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when OCI cloud controller is enabled] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.737 *******
TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ********************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.064) 0:04:01.801 *******
TASK [kubernetes/preinstall : Stop if kernel version is too low] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.852 *******
TASK [kubernetes/preinstall : Stop if bad hostname] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:01.904 *******
TASK [kubernetes/preinstall : check cloud_provider value] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:01.954 *******
TASK [kubernetes/preinstall : Get current version of calico cluster version] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.071) 0:04:02.026 *******
TASK [kubernetes/preinstall : Check that calico version is enough for upgrade] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.078 *******
TASK [kubernetes/preinstall : Check that kube_service_addresses is a network range] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.129 *******
TASK [kubernetes/preinstall : Check that kube_pods_subnet is a network range] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.052) 0:04:02.181 *******
TASK [kubernetes/preinstall : Check that kube_pods_subnet does not collide with kube_service_addresses] **************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.233 *******
TASK [kubernetes/preinstall : Stop if unknown dns mode] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.284 *******
TASK [kubernetes/preinstall : Stop if unknown kube proxy mode] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:02.335 *******
TASK [kubernetes/preinstall : Stop if vault is chose] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.064) 0:04:02.399 *******
TASK [kubernetes/preinstall : Stop if unknown cert_management] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.453 *******
TASK [kubernetes/preinstall : Stop if unknown resolvconf_mode] *******************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.052) 0:04:02.505 *******
TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.560 *******
TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.058) 0:04:02.619 *******
TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.059) 0:04:02.679 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.730 *******
TASK [kubernetes/preinstall : ansible_architecture_rename] ***********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:02.780 *******
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.835 *******
TASK [kubernetes/preinstall : check if atomic host] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:02.885 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.064) 0:04:02.949 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.052) 0:04:03.001 *******
TASK [kubernetes/preinstall : check resolvconf] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.052 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.102 *******
TASK [kubernetes/preinstall : set_fact] ******************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.053) 0:04:03.155 *******
TASK [kubernetes/preinstall : check if kubelet is configured] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.205 *******
TASK [kubernetes/preinstall : check if early DNS configuration stage] ************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.256 *******
TASK [kubernetes/preinstall : target resolv.conf files] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.306 *******
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] ***************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.356 *******
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.406 *******
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.455 *******
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.053) 0:04:03.509 *******
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.063) 0:04:03.573 *******
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.623 *******
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.674 *******
TASK [kubernetes/preinstall : generate search domains to resolvconf] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.051) 0:04:03.726 *******
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.776 *******
TASK [kubernetes/preinstall : generate nameservers to resolvconf] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.826 *******
TASK [kubernetes/preinstall : gather os specific variables] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:03.878 *******
TASK [kubernetes/preinstall : force kube_proxy removal if proxy services are replaced by other means] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.065) 0:04:03.943 *******
TASK [kubernetes/preinstall : override kube_proxy_mode to ipvs if kube_proxy_remove is set, as ipvs won't require kube-proxy cleanup when kube-proxy daemonset gets deleted] *****************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.053) 0:04:03.997 *******
TASK [kubernetes/preinstall : Create kubernetes directories] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.049) 0:04:04.046 *******
TASK [kubernetes/preinstall : Create cni directories] ****************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.097) 0:04:04.144 *******
TASK [kubernetes/preinstall : Create local volume provisioner directories] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.083) 0:04:04.227 *******
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] ******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.065) 0:04:04.293 *******
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.050) 0:04:04.343 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] **********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.395 *******
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.081) 0:04:04.476 *******
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.082) 0:04:04.558 *******
TASK [kubernetes/preinstall : persist resolvconf cloud init file] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.610 *******
TASK [kubernetes/preinstall : Update package management cache (YUM)] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.661 *******
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ***********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.052) 0:04:04.714 *******
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.049) 0:04:04.763 *******
TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.815 *******
TASK [kubernetes/preinstall : Update package management cache (APT)] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.063) 0:04:04.879 *******
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.051) 0:04:04.930 *******
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] *************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.051) 0:04:04.981 *******
TASK [kubernetes/preinstall : Update common_required_pkgs with ipvsadm when kube_proxy_mode is ipvs] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.049) 0:04:05.031 *******
TASK [kubernetes/preinstall : Install packages requirements] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.082 *******
TASK [kubernetes/preinstall : Install ipvsadm for ClearLinux] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.092) 0:04:05.174 *******
TASK [kubernetes/preinstall : Confirm selinux deployed] **************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.225 *******
TASK [kubernetes/preinstall : Set selinux policy] ********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.277 *******
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] ***************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.055) 0:04:05.332 *******
TASK [kubernetes/preinstall : Stat sysctl file configuration] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.054) 0:04:05.386 *******
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.438 *******
TASK [kubernetes/preinstall : Make sure sysctl file path folder exists] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.066) 0:04:05.505 *******
TASK [kubernetes/preinstall : Enable ip forwarding] ******************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.055) 0:04:05.560 *******
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.053) 0:04:05.614 *******
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] **********************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.664 *******
TASK [kubernetes/preinstall : Hosts | Retrieve hosts file content] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.716 *******
TASK [kubernetes/preinstall : Hosts | Extract existing entries for localhost from hosts file] ************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.767 *******
TASK [kubernetes/preinstall : Hosts | Update target hosts file entries dict with required entries] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.057) 0:04:05.824 *******
TASK [kubernetes/preinstall : Hosts | Update (if necessary) hosts file] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.072) 0:04:05.897 *******
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.072) 0:04:05.970 *******
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] *************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.024 *******
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.053) 0:04:06.077 *******
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.067) 0:04:06.144 *******
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ***********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.199 *******
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.253 *******
TASK [kubernetes/preinstall : install growpart] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.305 *******
TASK [kubernetes/preinstall : check if growpart needs to be run] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.358 *******
TASK [kubernetes/preinstall : check fs type] *************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.412 *******
TASK [kubernetes/preinstall : run growpart] **************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.070) 0:04:06.483 *******
TASK [kubernetes/preinstall : run xfs_growfs] ************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.068) 0:04:06.552 *******
PLAY [kube-master] ***************************************************************************************************************************************************************************************************************************
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.088) 0:04:06.641 *******
TASK [download : Download items] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.693 *******
TASK [download : Sync container] *************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.539) 0:04:07.233 *******
TASK [download : include_tasks] **************************************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.513) 0:04:07.746 *******
TASK [kubespray-defaults : Configure defaults] ***********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.052) 0:04:07.798 *******
ok: [monstrinho] => {
"msg": "Check roles/kubespray-defaults/defaults/main.yml"
}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Wait for kube-apiserver] *******************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:49 -0200 (0:00:00.128) 0:04:07.927 *******
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:13:50 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old CoreDNS resources] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:49 -0200 (0:00:00.509) 0:04:08.437 *******
ok: [monstrinho] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: deployment.extensions \"coredns\" deleted"}
ok: [monstrinho] => (item=configmap) => {"changed": false, "item": "configmap", "msg": "success: configmap \"coredns\" deleted"}
ok: [monstrinho] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: service \"coredns\" deleted"}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old nodelocalDNS resources] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:51 -0200 (0:00:01.689) 0:04:10.126 *******
ok: [monstrinho] => (item=deamonset) => {"changed": false, "item": "deamonset", "msg": "success: "}
ok: [monstrinho] => (item=configmap) => {"changed": false, "item": "configmap", "msg": "success: "}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm CoreDNS] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:53 -0200 (0:00:02.602) 0:04:12.729 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old KubeDNS resources] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:53 -0200 (0:00:00.060) 0:04:12.789 *******
ok: [monstrinho] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: "}
ok: [monstrinho] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: "}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm KubeDNS] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.546) 0:04:13.336 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old KubeDNS Autoscaler deployment] **************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.073) 0:04:13.410 *******
ok: [monstrinho] => {"changed": false, "msg": "success: "}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.394) 0:04:13.804 *******
ok: [monstrinho] => (item={u'type': u'configmap', u'name': u'coredns', u'file': u'coredns-config.yml'}) => {"changed": false, "checksum": "cf2b13b37cf3dae2789fb97755da2a649d3498fe", "dest": "/etc/kubernetes/coredns-config.yml", "gid": 0, "group": "root", "item": {"file": "coredns-config.yml", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 509, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'coredns', u'file': u'coredns-sa.yml'}) => {"changed": false, "checksum": "bbdff809c4fa8335354b4a1caf9e7de7d5873edc", "dest": "/etc/kubernetes/coredns-sa.yml", "gid": 0, "group": "root", "item": {"file": "coredns-sa.yml", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 194, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'coredns', u'file': u'coredns-deployment.yml'}) => {"changed": false, "checksum": "953518d409de7d6a33a3e9a2b8bd91dfade89451", "dest": "/etc/kubernetes/coredns-deployment.yml", "gid": 0, "group": "root", "item": {"file": "coredns-deployment.yml", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 2979, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'svc', u'name': u'coredns', u'file': u'coredns-svc.yml'}) => {"changed": false, "checksum": "d94019ce7cc367047428d3d626c59a72c933512f", "dest": "/etc/kubernetes/coredns-svc.yml", "gid": 0, "group": "root", "item": {"file": "coredns-svc.yml", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 585, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'coredns', u'file': u'coredns-clusterrole.yml'}) => {"changed": false, "checksum": "638ee75cd21ffe8435b435a054e6ba0510173568", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrole.yml", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 379, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'coredns', u'file': u'coredns-clusterrolebinding.yml'}) => {"changed": false, "checksum": "a1e8fc4ad3d31c2e15ca75bfc42ce795b10e903b", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrolebinding.yml", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 445, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-sa.yml'}) => {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-sa.yml", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-clusterrole.yml'}) => {"changed": false, "checksum": "ea4e2f28ad0490e19b1463a2072cff300e28063e", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrole.yml", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1142, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-clusterrolebinding.yml'}) => {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler.yml'}) => {"changed": false, "checksum": "c5c21f7d2fe03ab570a0822fc45ce91efc042f39", "dest": "/etc/kubernetes/dns-autoscaler.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler.yml", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2480, "state": "file", "uid": 0}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Secondary CoreDNS Template] *******************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:00 -0200 (0:00:06.000) 0:04:19.805 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down nodelocaldns Template] ************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.107) 0:04:19.913 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down KubeDNS Template] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.078) 0:04:19.992 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Patch system:kube-dns ClusterRole] *********************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.132) 0:04:20.125 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Resources] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.056) 0:04:20.181 *******
ok: [monstrinho] => (item=coredns-config.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "cf2b13b37cf3dae2789fb97755da2a649d3498fe", "dest": "/etc/kubernetes/coredns-config.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-config.yml"}, "before": {"path": "/etc/kubernetes/coredns-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-config.yml", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 509, "state": "file", "uid": 0}, "msg": "success: configmap/coredns created"}
ok: [monstrinho] => (item=coredns-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "bbdff809c4fa8335354b4a1caf9e7de7d5873edc", "dest": "/etc/kubernetes/coredns-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-sa.yml"}, "before": {"path": "/etc/kubernetes/coredns-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-sa.yml", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 194, "state": "file", "uid": 0}, "msg": "success: serviceaccount/coredns unchanged"}
ok: [monstrinho] => (item=coredns-deployment.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "953518d409de7d6a33a3e9a2b8bd91dfade89451", "dest": "/etc/kubernetes/coredns-deployment.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-deployment.yml"}, "before": {"path": "/etc/kubernetes/coredns-deployment.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-deployment.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-deployment.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-deployment.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-deployment.yml", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 2979, "state": "file", "uid": 0}, "msg": "success: deployment.extensions/coredns created"}
ok: [monstrinho] => (item=coredns-svc.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "d94019ce7cc367047428d3d626c59a72c933512f", "dest": "/etc/kubernetes/coredns-svc.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-svc.yml"}, "before": {"path": "/etc/kubernetes/coredns-svc.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-svc.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-svc.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-svc.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-svc.yml", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 585, "state": "file", "uid": 0}, "msg": "success: service/coredns created"}
ok: [monstrinho] => (item=coredns-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "638ee75cd21ffe8435b435a054e6ba0510173568", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrole.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrole.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrole.yml", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 379, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:coredns unchanged"}
ok: [monstrinho] => (item=coredns-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "a1e8fc4ad3d31c2e15ca75bfc42ce795b10e903b", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrolebinding.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrolebinding.yml", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 445, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:coredns unchanged"}
ok: [monstrinho] => (item=dns-autoscaler-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-sa.yml", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0}, "msg": "success: serviceaccount/dns-autoscaler unchanged"}
ok: [monstrinho] => (item=dns-autoscaler-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "ea4e2f28ad0490e19b1463a2072cff300e28063e", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrole.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrole.yml", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1142, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"}
ok: [monstrinho] => (item=dns-autoscaler-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrolebinding.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"}
ok: [monstrinho] => (item=dns-autoscaler.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "c5c21f7d2fe03ab570a0822fc45ce91efc042f39", "dest": "/etc/kubernetes/dns-autoscaler.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler.yml", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2480, "state": "file", "uid": 0}, "msg": "success: deployment.apps/dns-autoscaler unchanged"}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Check if netchecker-server manifest already exists] ****************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:05.218) 0:04:25.400 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Apply netchecker-server manifest to update annotations] ************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.062) 0:04:25.462 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Netchecker Templates list] *****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.056) 0:04:25.518 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Append extra templates to Netchecker Templates list for PodSecurityPolicy] *****************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.053) 0:04:25.572 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Netchecker Template] **************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.059) 0:04:25.632 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Purge old Netchecker server] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.056) 0:04:25.688 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Netchecker Resources] ****************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.053) 0:04:25.742 *******
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old kubernetes-dashboard resources] *************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.058) 0:04:25.801 *******
ok: [monstrinho] => (item=ClusterRoleBinding) => {"changed": false, "item": "ClusterRoleBinding", "msg": "success: "}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay down dashboard template] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:07 -0200 (0:00:00.528) 0:04:26.329 *******
ok: [monstrinho] => (item={u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}) => {"changed": false, "checksum": "003dbd94894a7985004896023feb22e497979c2c", "dest": "/etc/kubernetes/dashboard.yml", "gid": 0, "group": "root", "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 5996, "state": "file", "uid": 0}
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start dashboard] ***************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.712) 0:04:27.042 *******
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/dashboard.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/dashboard.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/dashboard.yml'}, u'before': {u'path': u'/etc/kubernetes/dashboard.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, 'item': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, 'checksum': u'003dbd94894a7985004896023feb22e497979c2c', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/dashboard.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'dashboard.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/dashboard.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 5996, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "003dbd94894a7985004896023feb22e497979c2c", "dest": "/etc/kubernetes/dashboard.yml", "diff": {"after": {"path": "/etc/kubernetes/dashboard.yml"}, "before": {"path": "/etc/kubernetes/dashboard.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dashboard.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dashboard.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dashboard.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 5996, "state": "file", "uid": 0}, "msg": "success: secret/kubernetes-dashboard-certs unchanged serviceaccount/kubernetes-dashboard unchanged role.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged rolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous unchanged clusterrolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous configured deployment.apps/kubernetes-dashboard unchanged service/kubernetes-dashboard unchanged"}
TASK [kubernetes-apps/helm : Helm | Make sure HELM_HOME directory exists] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.616) 0:04:27.658 *******
TASK [kubernetes-apps/helm : Helm | Set up helm launcher] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.049) 0:04:27.708 *******
TASK [kubernetes-apps/helm : Helm | Lay Down Helm Manifests (RBAC)] **************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.049) 0:04:27.757 *******
TASK [kubernetes-apps/helm : Helm | Apply Helm Manifests (RBAC)] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.068) 0:04:27.826 *******
TASK [kubernetes-apps/helm : Helm | Set up TLS] **********************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.070) 0:04:27.896 *******
TASK [kubernetes-apps/helm : Helm | Install/upgrade helm] ************************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:27.944 *******
TASK [kubernetes-apps/helm : Helm | Force apply tiller overrides if necessary] ***************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.052) 0:04:27.997 *******
TASK [kubernetes-apps/helm : Helm | Set up bash completion] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.049 *******
TASK [kubernetes-apps/registry : Registry | Create addon dir] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.050) 0:04:28.099 *******
TASK [kubernetes-apps/registry : Registry | Templates list] **********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.049) 0:04:28.148 *******
TASK [kubernetes-apps/registry : Registry | Append extra templates to Registry Templates list for PodSecurityPolicy] *************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.063) 0:04:28.212 *******
TASK [kubernetes-apps/registry : Registry | Create manifests] ********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.264 *******
TASK [kubernetes-apps/registry : Registry | Apply manifests] *********************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.056) 0:04:28.321 *******
TASK [kubernetes-apps/registry : Registry | Create PVC manifests] ****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.053) 0:04:28.374 *******
TASK [kubernetes-apps/registry : Registry | Apply PVC manifests] *****************************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.053) 0:04:28.428 *******
TASK [kubernetes-apps/metrics_server : Check all masters are node or not] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.062) 0:04:28.491 *******
TASK [kubernetes-apps/metrics_server : Metrics Server | Delete addon dir] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.060) 0:04:28.551 *******
TASK [kubernetes-apps/metrics_server : Metrics Server | Create addon dir] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.603 *******
TASK [kubernetes-apps/metrics_server : Metrics Server | Templates list] **********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.047) 0:04:28.650 *******
TASK [kubernetes-apps/metrics_server : Metrics Server | Create manifests] ********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:28.699 *******
TASK [kubernetes-apps/metrics_server : Metrics Server | Apply manifests] *********************************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.052) 0:04:28.751 *******
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Lay down OpenStack Cinder Storage Class template] *******************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.070) 0:04:28.822 *******
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Add OpenStack Cinder Storage Class] *********************************************************************************************************************
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:28.870 *******
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU| gather os specific variables] ******************************************************************************************************
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.046) 0:04:28.916 *******
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml) => {"ansible_facts": {"nvidia_driver_install_container": "gcr.io/google-containers/ubuntu-nvidia-driver-installer@sha256:eea7309dc4fa4a5c9d716157e74b90826e0a853aa26c7219db4710ddcd1ad8bc", "nvidia_driver_install_supported": true}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml"}
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url Tesla] ***************************************************************************************************
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.156) 0:04:29.073 *******
ok: [monstrinho] => {"ansible_facts": {"nvidia_driver_download_url_default": "https://us.download.nvidia.com/tesla/390.87/NVIDIA-Linux-x86_64-390.87.run"}, "changed": false}
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url GTX] *****************************************************************************************************
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.146) 0:04:29.219 *******
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create addon dir] *****************************************************************************************************************
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.057) 0:04:29.277 *******
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator", "size": 4, "state": "directory", "uid": 0}
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators] *****************************************************************************************
Tuesday 29 January 2019 13:14:11 -0200 (0:00:00.618) 0:04:29.896 *******
ok: [monstrinho] => (item={u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}) => {"changed": false, "checksum": "752e34d52f34865cbb566ebc2a2f3b9ffd8b210b", "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "gid": 0, "group": "root", "item": {"file": "nvidia-driver-install-daemonset.yml", "name": "nvidia-driver-install-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "size": 2525, "state": "file", "uid": 0}
ok: [monstrinho] => (item={u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}) => {"changed": false, "checksum": "a619924c0ad0c377b995b531776d94344c47ff95", "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "gid": 0, "group": "root", "item": {"file": "k8s-device-plugin-nvidia-daemonset.yml", "name": "k8s-device-plugin-nvidia-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "size": 1612, "state": "file", "uid": 0}
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Apply manifests for nvidia accelerators] ******************************************************************************************
Tuesday 29 January 2019 13:14:13 -0200 (0:00:02.224) 0:04:32.120 *******
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml'}, u'before': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}, 'item': {u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}, 'checksum': u'752e34d52f34865cbb566ebc2a2f3b9ffd8b210b', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0755', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'nvidia-driver-install-daemonset.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 2525, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "752e34d52f34865cbb566ebc2a2f3b9ffd8b210b", "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml"}, "before": {"path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "nvidia-driver-install-daemonset.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "nvidia-driver-install-daemonset.yml", "name": "nvidia-driver-install-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "size": 2525, "state": "file", "uid": 0}, "msg": "success: daemonset.extensions/nvidia-driver-installer configured"}
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml'}, u'before': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}, 'item': {u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}, 'checksum': u'a619924c0ad0c377b995b531776d94344c47ff95', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0755', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'k8s-device-plugin-nvidia-daemonset.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 1612, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "a619924c0ad0c377b995b531776d94344c47ff95", "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml"}, "before": {"path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "k8s-device-plugin-nvidia-daemonset.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "k8s-device-plugin-nvidia-daemonset.yml", "name": "k8s-device-plugin-nvidia-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "size": 1612, "state": "file", "uid": 0}, "msg": "success: daemonset.apps/nvidia-gpu-device-plugin unchanged"}
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_private_key] *************************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:01.444) 0:04:33.565 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_region_id] ***************************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.056) 0:04:33.621 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_tenancy_id] **************************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.053) 0:04:33.675 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_id] *****************************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.055) 0:04:33.731 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_fingerprint] ********************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.051) 0:04:33.783 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_compartment_id] **********************************************************************************************************************************
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.052) 0:04:33.836 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_vnc_id] ******************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.053) 0:04:33.889 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet1_id] **************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.050) 0:04:33.940 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet2_id] **************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.064) 0:04:34.004 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_security_list_management] ************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.052) 0:04:34.056 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Generate Configuration] **************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.052) 0:04:34.108 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Encode Configuration] ****************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.054) 0:04:34.163 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Configuration To Secret] *******************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.056) 0:04:34.219 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Configuration] *****************************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.056) 0:04:34.275 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Download Controller Manifest] ********************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.054) 0:04:34.330 *******
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Controller Manifest] ***********************************************************************************************************************************************
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.053) 0:04:34.383 *******
PLAY RECAP ***********************************************************************************************************************************************************************************************************************************
localhost : ok=1 changed=0 unreachable=0 failed=0
monstrinho : ok=368 changed=37 unreachable=0 failed=0
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.028) 0:04:34.412 *******
===============================================================================
download : container_download | download images for kubeadm config images ------------------------------------------------------------------------------------------------------------------------------------------------------------ 34.41s
kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 6.00s
network_plugin/calico : Calico | Copy cni plugins from calico/cni container ----------------------------------------------------------------------------------------------------------------------------------------------------------- 5.76s
kubernetes-apps/ansible : Kubernetes Apps | Start Resources --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 5.22s
network_plugin/calico : Calico | Create calico manifests ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 4.24s
download : container_download | Download containers if pull is required or told to always pull (all nodes) ---------------------------------------------------------------------------------------------------------------------------- 3.94s
kubernetes-apps/network_plugin/calico : Start Calico resources ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 3.69s
container-engine/docker : ensure docker packages are installed ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.75s
network_plugin/calico : Get current version of calico cluster version ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.62s
kubernetes-apps/ansible : Kubernetes Apps | Delete old nodelocalDNS resources --------------------------------------------------------------------------------------------------------------------------------------------------------- 2.60s
kubernetes/master : kubeadm | Remove taint for master with node role ------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.57s
network_plugin/calico : Calico | Set global as_num ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.57s
network_plugin/calico : Calico | Check if calico network pool has already been configured --------------------------------------------------------------------------------------------------------------------------------------------- 2.51s
kubernetes/preinstall : Get current version of calico cluster version ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.51s
container-engine/docker : Ensure old versions of Docker are not installed. | Debian --------------------------------------------------------------------------------------------------------------------------------------------------- 2.26s
kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators ----------------------------------------------------------------------------------------- 2.22s
policy_controller/calico : Start of Calico kube controllers --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.17s
kubernetes/client : Generate admin kubeconfig with external api endpoint -------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.95s
policy_controller/calico : Create calico-kube-controllers manifests ------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.89s
network_plugin/calico : Calico | Copy cni plugins ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.85s
~/D/P/m/kubespray ❯❯❯ master ✭ ◼
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment