Created
January 29, 2019 15:17
-
-
Save yangm97/f9bbcde781150c06b7f0bf94dfdc8d41 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Last login: Tue Jan 29 12:49:40 on ttys002 | |
~/D/P/m/kubespray ❯❯❯ ansible-playbook -i inventory/yetanothernerd/hosts.ini cluster.yml -b -v --user ansible master ✭ ◼ | |
Using /Users/yan/Documents/Projects/monstrinho/kubespray/ansible.cfg as config file | |
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet host_list requirements, check plugin documentation if this is unexpected | |
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet script requirements, check plugin documentation if this is unexpected | |
/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/hosts.ini did not meet yaml requirements, check plugin documentation if this is unexpected | |
PLAY [localhost] ***************************************************************************************************************************************************************************************************************************** | |
TASK [Check ansible version !=2.7.0] ********************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.106) 0:00:00.106 ******* | |
ok: [localhost] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
[WARNING]: Could not match supplied host pattern, ignoring: bastion | |
PLAY [bastion[0]] **************************************************************************************************************************************************************************************************************************** | |
skipping: no hosts matched | |
[WARNING]: Could not match supplied host pattern, ignoring: calico-rr | |
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************ | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.093) 0:00:00.199 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.052) 0:00:00.251 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:41 -0200 (0:00:00.511) 0:00:00.762 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.499) 0:00:01.262 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.048) 0:00:01.310 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [bootstrap-os : Fetch /etc/os-release] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.125) 0:00:01.436 ******* | |
ok: [monstrinho] => {"changed": false, "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "NAME=\"Ubuntu\"\r\nVERSION=\"18.04.1 LTS (Bionic Beaver)\"\r\nID=ubuntu\r\nID_LIKE=debian\r\nPRETTY_NAME=\"Ubuntu 18.04.1 LTS\"\r\nVERSION_ID=\"18.04\"\r\nHOME_URL=\"https://www.ubuntu.com/\"\r\nSUPPORT_URL=\"https://help.ubuntu.com/\"\r\nBUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"\r\nPRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"\r\nVERSION_CODENAME=bionic\r\nUBUNTU_CODENAME=bionic\r\n", "stdout_lines": ["NAME=\"Ubuntu\"", "VERSION=\"18.04.1 LTS (Bionic Beaver)\"", "ID=ubuntu", "ID_LIKE=debian", "PRETTY_NAME=\"Ubuntu 18.04.1 LTS\"", "VERSION_ID=\"18.04\"", "HOME_URL=\"https://www.ubuntu.com/\"", "SUPPORT_URL=\"https://help.ubuntu.com/\"", "BUG_REPORT_URL=\"https://bugs.launchpad.net/ubuntu/\"", "PRIVACY_POLICY_URL=\"https://www.ubuntu.com/legal/terms-and-policies/privacy-policy\"", "VERSION_CODENAME=bionic", "UBUNTU_CODENAME=bionic"]} | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.185) 0:00:01.621 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/bootstrap-os/tasks/bootstrap-ubuntu.yml for monstrinho | |
TASK [bootstrap-os : List ubuntu_packages] *************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.093) 0:00:01.715 ******* | |
ok: [monstrinho] => {"ansible_facts": {"ubuntu_packages": ["python", "python-apt", "python-pip", "dbus"]}, "changed": false} | |
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:42 -0200 (0:00:00.122) 0:00:01.837 ******* | |
ok: [monstrinho] => (item=python) => {"changed": false, "failed_when_result": false, "item": "python", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python\r\n", "stdout_lines": ["python"]} | |
ok: [monstrinho] => (item=python-apt) => {"changed": false, "failed_when_result": false, "item": "python-apt", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python-apt\r\n", "stdout_lines": ["python-apt"]} | |
ok: [monstrinho] => (item=python-pip) => {"changed": false, "failed_when_result": false, "item": "python-pip", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "python-pip\r\n", "stdout_lines": ["python-pip"]} | |
ok: [monstrinho] => (item=dbus) => {"changed": false, "failed_when_result": false, "item": "dbus", "rc": 0, "stderr": "Shared connection to y.mpc.yetanothernerd.xyz closed.\r\n", "stderr_lines": ["Shared connection to y.mpc.yetanothernerd.xyz closed."], "stdout": "dbus\r\n", "stdout_lines": ["dbus"]} | |
TASK [bootstrap-os : Add proxy to /etc/apt/apt.conf if http_proxy is defined] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.469) 0:00:02.306 ******* | |
TASK [bootstrap-os : Add proxy to /etc/apt/apt.conf if https_proxy is defined] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.071) 0:00:02.377 ******* | |
TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.061) 0:00:02.439 ******* | |
TASK [bootstrap-os : set_fact] *************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.064) 0:00:02.504 ******* | |
ok: [monstrinho] => {"ansible_facts": {"ansible_python_interpreter": "/usr/bin/python"}, "changed": false} | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.247) 0:00:02.751 ******* | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:43 -0200 (0:00:00.066) 0:00:02.818 ******* | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.058) 0:00:02.876 ******* | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.063) 0:00:02.939 ******* | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.067) 0:00:03.006 ******* | |
TASK [bootstrap-os : include_tasks] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.066) 0:00:03.073 ******* | |
TASK [bootstrap-os : Remove require tty] ***************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.064) 0:00:03.137 ******* | |
ok: [monstrinho] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
TASK [bootstrap-os : Create remote_tmp for it is used by another module] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:44 -0200 (0:00:00.717) 0:00:03.855 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.ansible/tmp", "size": 2, "state": "directory", "uid": 0} | |
TASK [bootstrap-os : Gather nodes hostnames] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:45 -0200 (0:00:00.709) 0:00:04.565 ******* | |
ok: [monstrinho] | |
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS and Tumbleweed)] ******************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:46 -0200 (0:00:01.007) 0:00:05.572 ******* | |
ok: [monstrinho] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "monstrinho.cluster.local", "ansible_hostname": "monstrinho", "ansible_nodename": "monstrinho"}, "changed": false, "name": "monstrinho"} | |
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS and Tumbleweed only)] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:48 -0200 (0:00:01.610) 0:00:07.183 ******* | |
TASK [bootstrap-os : Update hostname fact (CoreOS and Tumbleweed only)] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:48 -0200 (0:00:00.061) 0:00:07.244 ******* | |
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************ | |
TASK [gather facts from all instances] ******************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:48 -0200 (0:00:00.120) 0:00:07.365 ******* | |
ok: [monstrinho -> None] => (item=monstrinho) | |
ok: [monstrinho -> None] => (item=monstrinho) | |
PLAY [k8s-cluster:etcd:calico-rr] ************************************************************************************************************************************************************************************************************ | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:50 -0200 (0:00:01.639) 0:00:09.004 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:50 -0200 (0:00:00.055) 0:00:09.059 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:50 -0200 (0:00:00.541) 0:00:09.600 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.513) 0:00:10.114 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.054) 0:00:10.168 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:51 -0200 (0:00:00.155) 0:00:10.323 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 998, "name": "kube-cert", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:52 -0200 (0:00:00.705) 0:00:11.029 ******* | |
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 998, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999} | |
TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:52 -0200 (0:00:00.487) 0:00:11.517 ******* | |
ok: [monstrinho] => (item=swap) => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "item": "swap", "name": "swap", "opts": "defaults", "passno": "0"} | |
ok: [monstrinho] => (item=none) => {"changed": false, "dump": "0", "fstab": "/etc/fstab", "fstype": "swap", "item": "none", "name": "none", "opts": "defaults", "passno": "0"} | |
TASK [kubernetes/preinstall : Disable swap] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.583) 0:00:12.100 ******* | |
TASK [kubernetes/preinstall : Stop if ansible version is too low] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.060) 0:00:12.161 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if either kube-master, kube-node or etcd is empty] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.180) 0:00:12.342 ******* | |
ok: [monstrinho] => (item=kube-master) => { | |
"changed": false, | |
"item": "kube-master", | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item=kube-node) => { | |
"changed": false, | |
"item": "kube-node", | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item=etcd) => { | |
"changed": false, | |
"item": "etcd", | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if non systemd OS type] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.203) 0:00:12.546 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown OS] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:53 -0200 (0:00:00.182) 0:00:12.728 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown network plugin] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.148) 0:00:12.876 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.152) 0:00:13.029 ******* | |
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] *********************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.058) 0:00:13.088 ******* | |
ok: [monstrinho] => (item={u'name': u'download_run_once', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "download_run_once", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item={u'name': u'deploy_netchecker', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "deploy_netchecker", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item={u'name': u'download_always_pull', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "download_always_pull", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item={u'name': u'helm_enabled', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "helm_enabled", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [monstrinho] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "openstack_lbaas_enabled", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.288) 0:00:13.377 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if memory is too small for masters] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.164) 0:00:13.541 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.153) 0:00:13.695 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:54 -0200 (0:00:00.149) 0:00:13.844 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.156) 0:00:14.001 ******* | |
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.053) 0:00:14.054 ******* | |
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.065) 0:00:14.119 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when OCI cloud controller is enabled] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.160) 0:00:14.280 ******* | |
TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.053) 0:00:14.333 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if kernel version is too low] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.148) 0:00:14.482 ******* | |
TASK [kubernetes/preinstall : Stop if bad hostname] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.052) 0:00:14.534 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : check cloud_provider value] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.162) 0:00:14.697 ******* | |
TASK [kubernetes/preinstall : Get current version of calico cluster version] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:55 -0200 (0:00:00.082) 0:00:14.779 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl version | grep 'Cluster Version:' | awk '{ print $3}'", "delta": "0:00:02.119737", "end": "2019-01-29 13:09:59.344233", "rc": 0, "start": "2019-01-29 13:09:57.224496", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "v3.1.3", "stdout_lines": ["v3.1.3"]} | |
TASK [kubernetes/preinstall : Check that calico version is enough for upgrade] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:58 -0200 (0:00:02.506) 0:00:17.285 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Check that kube_service_addresses is a network range] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.174) 0:00:17.460 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Check that kube_pods_subnet is a network range] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.146) 0:00:17.607 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Check that kube_pods_subnet does not collide with kube_service_addresses] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:58 -0200 (0:00:00.148) 0:00:17.755 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown dns mode] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.150) 0:00:17.906 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown kube proxy mode] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.150) 0:00:18.057 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if vault is chose] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.161) 0:00:18.218 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown cert_management] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.151) 0:00:18.370 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown resolvconf_mode] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.149) 0:00:18.519 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:09:59 -0200 (0:00:00.164) 0:00:18.684 ******* | |
ok: [monstrinho -> localhost] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.424) 0:00:19.109 ******* | |
TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.067) 0:00:19.176 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.057) 0:00:19.234 ******* | |
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false} | |
TASK [kubernetes/preinstall : ansible_architecture_rename] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.170) 0:00:19.404 ******* | |
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false} | |
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.147) 0:00:19.551 ******* | |
TASK [kubernetes/preinstall : check if atomic host] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:00 -0200 (0:00:00.052) 0:00:19.603 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.290) 0:00:19.894 ******* | |
ok: [monstrinho] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.167) 0:00:20.061 ******* | |
TASK [kubernetes/preinstall : check resolvconf] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.051) 0:00:20.112 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002216", "end": "2019-01-29 13:10:02.465701", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:10:02.463485", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.272) 0:00:20.385 ******* | |
ok: [monstrinho] => {"ansible_facts": {"resolvconf": false}, "changed": false} | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.174) 0:00:20.559 ******* | |
ok: [monstrinho] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "cloud_resolver": []}, "changed": false} | |
TASK [kubernetes/preinstall : check if kubelet is configured] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:01 -0200 (0:00:00.152) 0:00:20.712 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548773223.1382842, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "e3636281c3fa1cfa88a1bf04b15e5c63b6af3133", "ctime": 1548773213.410339, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201881, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1548773213.270339, "nlink": 1, "path": "/etc/kubernetes/kubelet.env", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1775, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/preinstall : check if early DNS configuration stage] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.286) 0:00:20.998 ******* | |
ok: [monstrinho] => {"ansible_facts": {"dns_early": false}, "changed": false} | |
TASK [kubernetes/preinstall : target resolv.conf files] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.190) 0:00:21.189 ******* | |
ok: [monstrinho] => {"ansible_facts": {"base": "", "head": "", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] *************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.156) 0:00:21.345 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.057) 0:00:21.403 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.322) 0:00:21.725 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:02 -0200 (0:00:00.059) 0:00:21.785 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548769633.648093, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1538549416.8988576, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 12381, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1507812486.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.545) 0:00:22.330 ******* | |
ok: [monstrinho] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.169) 0:00:22.500 ******* | |
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.057) 0:00:22.558 ******* | |
ok: [monstrinho] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false} | |
TASK [kubernetes/preinstall : generate search domains to resolvconf] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:03 -0200 (0:00:00.166) 0:00:22.724 ******* | |
ok: [monstrinho] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.152) 0:00:22.876 ******* | |
ok: [monstrinho] => {"ansible_facts": {"dnsmasq_server": ["10.233.0.3"]}, "changed": false} | |
TASK [kubernetes/preinstall : generate nameservers to resolvconf] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.153) 0:00:23.030 ******* | |
ok: [monstrinho] => {"ansible_facts": {"nameserverentries": "nameserver 10.233.0.3", "supersede_nameserver": "supersede domain-name-servers 10.233.0.3;"}, "changed": false} | |
TASK [kubernetes/preinstall : gather os specific variables] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.158) 0:00:23.188 ******* | |
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"} | |
TASK [kubernetes/preinstall : force kube_proxy removal if proxy services are replaced by other means] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.166) 0:00:23.355 ******* | |
ok: [monstrinho] => {"ansible_facts": {"kube_proxy_remove": false}, "changed": false} | |
TASK [kubernetes/preinstall : override kube_proxy_mode to ipvs if kube_proxy_remove is set, as ipvs won't require kube-proxy cleanup when kube-proxy daemonset gets deleted] ***************************************************************** | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.156) 0:00:23.512 ******* | |
TASK [kubernetes/preinstall : Create kubernetes directories] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:04 -0200 (0:00:00.053) 0:00:23.565 ******* | |
ok: [monstrinho] => (item=/usr/local/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin", "mode": "0755", "owner": "kube", "path": "/usr/local/bin", "size": 10, "state": "directory", "uid": 999} | |
ok: [monstrinho] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 35, "state": "directory", "uid": 999} | |
ok: [monstrinho] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/ssl", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 15, "state": "directory", "uid": 999} | |
ok: [monstrinho] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 5, "state": "directory", "uid": 999} | |
ok: [monstrinho] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 2, "state": "directory", "uid": 999} | |
TASK [kubernetes/preinstall : Create cni directories] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:06 -0200 (0:00:01.599) 0:00:25.165 ******* | |
ok: [monstrinho] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 3, "state": "directory", "uid": 999} | |
changed: [monstrinho] => (item=/opt/cni/bin) => {"changed": true, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 16, "state": "directory", "uid": 999} | |
ok: [monstrinho] => (item=/var/lib/calico) => {"changed": false, "gid": 0, "group": "root", "item": "/var/lib/calico", "mode": "0755", "owner": "kube", "path": "/var/lib/calico", "size": 3, "state": "directory", "uid": 999} | |
TASK [kubernetes/preinstall : Create local volume provisioner directories] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:06 -0200 (0:00:00.656) 0:00:25.822 ******* | |
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.089) 0:00:25.912 ******* | |
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.096) 0:00:26.008 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.103) 0:00:26.112 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.151) 0:00:26.264 ******* | |
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.108) 0:00:26.372 ******* | |
TASK [kubernetes/preinstall : persist resolvconf cloud init file] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.057) 0:00:26.430 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM)] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.058) 0:00:26.488 ******* | |
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.050) 0:00:26.539 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.053) 0:00:26.593 ******* | |
TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.051) 0:00:26.644 ******* | |
TASK [kubernetes/preinstall : Update package management cache (APT)] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:07 -0200 (0:00:00.052) 0:00:26.696 ******* | |
ok: [monstrinho] => {"cache_update_time": 1548772906, "cache_updated": false, "changed": false} | |
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:08 -0200 (0:00:01.058) 0:00:27.755 ******* | |
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:08 -0200 (0:00:00.065) 0:00:27.820 ******* | |
TASK [kubernetes/preinstall : Update common_required_pkgs with ipvsadm when kube_proxy_mode is ipvs] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:09 -0200 (0:00:00.074) 0:00:27.895 ******* | |
ok: [monstrinho] => {"ansible_facts": {"common_required_pkgs": ["python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip", "ipvsadm"]}, "changed": false} | |
TASK [kubernetes/preinstall : Install packages requirements] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:09 -0200 (0:00:00.169) 0:00:28.064 ******* | |
ok: [monstrinho] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip', u'ipvsadm']) => {"attempts": 1, "cache_update_time": 1548772906, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip", "ipvsadm"]} | |
TASK [kubernetes/preinstall : Install ipvsadm for ClearLinux] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:10 -0200 (0:00:01.360) 0:00:29.425 ******* | |
TASK [kubernetes/preinstall : Confirm selinux deployed] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.060) 0:00:29.485 ******* | |
TASK [kubernetes/preinstall : Set selinux policy] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.076) 0:00:29.562 ******* | |
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.074) 0:00:29.636 ******* | |
TASK [kubernetes/preinstall : Stat sysctl file configuration] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:10 -0200 (0:00:00.062) 0:00:29.699 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548693575.5387287, "attr_flags": "", "attributes": [], "block_size": 512, "blocks": 1, "charset": "binary", "ctime": 1548529298.9829907, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 443132, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1547046713.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.298) 0:00:29.997 ******* | |
ok: [monstrinho] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : Make sure sysctl file path folder exists] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.198) 0:00:30.196 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc", "size": 252, "state": "directory", "uid": 0} | |
TASK [kubernetes/preinstall : Enable ip forwarding] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:11 -0200 (0:00:00.292) 0:00:30.489 ******* | |
ok: [monstrinho] => {"changed": false} | |
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.539) 0:00:31.028 ******* | |
ok: [monstrinho] => {"changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.597) 0:00:31.626 ******* | |
TASK [kubernetes/preinstall : Hosts | Retrieve hosts file content] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:12 -0200 (0:00:00.072) 0:00:31.699 ******* | |
ok: [monstrinho] => {"changed": false, "content": "MTI3LjAuMC4xIGxvY2FsaG9zdCBsb2NhbGhvc3QubG9jYWxkb21haW4KOjoxIGxvY2FsaG9zdDYgbG9jYWxob3N0Ni5sb2NhbGRvbWFpbgpmZjAyOjoxCQlpcDYtYWxsbm9kZXMKZmYwMjo6MgkJaXA2LWFsbHJvdXRlcnMKCiMgQW5zaWJsZSBpbnZlbnRvcnkgaG9zdHMgQkVHSU4KMTAuMC4xLjIgbW9uc3RyaW5obyBtb25zdHJpbmhvLmNsdXN0ZXIubG9jYWwKIyBBbnNpYmxlIGludmVudG9yeSBob3N0cyBFTkQK", "encoding": "base64", "source": "/etc/hosts"} | |
TASK [kubernetes/preinstall : Hosts | Extract existing entries for localhost from hosts file] ************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.498) 0:00:32.198 ******* | |
ok: [monstrinho] => (item=127.0.0.1 localhost localhost.localdomain) => {"ansible_facts": {"etc_hosts_localhosts_dict": {"127.0.0.1": ["localhost", "localhost.localdomain"]}}, "changed": false, "item": "127.0.0.1 localhost localhost.localdomain"} | |
ok: [monstrinho] => (item=::1 localhost6 localhost6.localdomain) => {"ansible_facts": {"etc_hosts_localhosts_dict": {"127.0.0.1": ["localhost", "localhost.localdomain"], "::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": "::1 localhost6 localhost6.localdomain"} | |
TASK [kubernetes/preinstall : Hosts | Update target hosts file entries dict with required entries] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.295) 0:00:32.494 ******* | |
ok: [monstrinho] => (item={'value': {u'expected': [u'localhost6', u'localhost6.localdomain'], u'unexpected': [u'localhost', u'localhost.localdomain']}, 'key': u'::1'}) => {"ansible_facts": {"etc_hosts_localhosts_dict_target": {"::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": {"key": "::1", "value": {"expected": ["localhost6", "localhost6.localdomain"], "unexpected": ["localhost", "localhost.localdomain"]}}} | |
ok: [monstrinho] => (item={'value': {u'expected': [u'localhost', u'localhost.localdomain']}, 'key': u'127.0.0.1'}) => {"ansible_facts": {"etc_hosts_localhosts_dict_target": {"127.0.0.1": ["localhost", "localhost.localdomain"], "::1": ["localhost6", "localhost6.localdomain"]}}, "changed": false, "item": {"key": "127.0.0.1", "value": {"expected": ["localhost", "localhost.localdomain"]}}} | |
TASK [kubernetes/preinstall : Hosts | Update (if necessary) hosts file] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:13 -0200 (0:00:00.182) 0:00:32.677 ******* | |
ok: [monstrinho] => (item={'value': [u'localhost6', u'localhost6.localdomain'], 'key': u'::1'}) => {"backup": "", "changed": false, "item": {"key": "::1", "value": ["localhost6", "localhost6.localdomain"]}, "msg": ""} | |
ok: [monstrinho] => (item={'value': [u'localhost', u'localhost.localdomain'], 'key': u'127.0.0.1'}) => {"backup": "", "changed": false, "item": {"key": "127.0.0.1", "value": ["localhost", "localhost.localdomain"]}, "msg": ""} | |
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.443) 0:00:33.120 ******* | |
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.060) 0:00:33.180 ******* | |
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.080) 0:00:33.261 ******* | |
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.075) 0:00:33.337 ******* | |
ok: [monstrinho] => {"changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:14 -0200 (0:00:00.291) 0:00:33.628 ******* | |
ok: [monstrinho] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"} | |
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.274) 0:00:33.903 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : install growpart] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.266) 0:00:34.169 ******* | |
TASK [kubernetes/preinstall : check if growpart needs to be run] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.074) 0:00:34.244 ******* | |
TASK [kubernetes/preinstall : check fs type] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.075) 0:00:34.319 ******* | |
TASK [kubernetes/preinstall : run growpart] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.076) 0:00:34.396 ******* | |
TASK [kubernetes/preinstall : run xfs_growfs] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.074) 0:00:34.470 ******* | |
TASK [container-engine/cri-o : gather os specific variables] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.064) 0:00:34.535 ******* | |
TASK [container-engine/cri-o : Add OpenShift Origin repository] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.077) 0:00:34.613 ******* | |
TASK [container-engine/cri-o : Make sure needed folders exist in the system] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.076) 0:00:34.690 ******* | |
TASK [container-engine/cri-o : Install cri-o packages] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.093) 0:00:34.783 ******* | |
TASK [container-engine/cri-o : Install cri-o config] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:15 -0200 (0:00:00.082) 0:00:34.865 ******* | |
TASK [container-engine/cri-o : Copy mounts.conf] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.078) 0:00:34.943 ******* | |
TASK [container-engine/cri-o : Create directory for oci hooks] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.061) 0:00:35.005 ******* | |
TASK [container-engine/cri-o : Install cri-o service] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.072) 0:00:35.077 ******* | |
TASK [container-engine/rkt : gather os specific variables for rkt] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.068) 0:00:35.146 ******* | |
TASK [container-engine/rkt : install rkt pkg on ubuntu] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.111) 0:00:35.257 ******* | |
TASK [container-engine/rkt : install rkt pkg on fedora] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.071) 0:00:35.329 ******* | |
TASK [container-engine/rkt : install rkt pkg on centos] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.068) 0:00:35.397 ******* | |
TASK [container-engine/rkt : install rkt pkg on openSUSE] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.065) 0:00:35.463 ******* | |
TASK [container-engine/rkt : Set up cron job to do garbage cleanup] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.075) 0:00:35.538 ******* | |
TASK [container-engine/docker-storage : docker-storage-setup | install git and make] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.073) 0:00:35.611 ******* | |
TASK [container-engine/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.094) 0:00:35.706 ******* | |
TASK [container-engine/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] *********************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.054) 0:00:35.761 ******* | |
TASK [container-engine/docker-storage : docker-storage-override | docker service storage-setup override file] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:16 -0200 (0:00:00.076) 0:00:35.837 ******* | |
TASK [container-engine/docker-storage : docker-storage-setup | install lvm2] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.058) 0:00:35.895 ******* | |
TASK [container-engine/docker-storage : docker-storage-setup | install and run container-storage-setup] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.073) 0:00:35.969 ******* | |
TASK [container-engine/docker : check if atomic host] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.060) 0:00:36.029 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"exists": false}} | |
TASK [container-engine/docker : set_fact] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.616) 0:00:36.645 ******* | |
ok: [monstrinho] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
TASK [container-engine/docker : gather os specific variables] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:17 -0200 (0:00:00.177) 0:00:36.822 ******* | |
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/../vars/ubuntu-bionic.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb [arch=amd64] {{ docker_ubuntu_repo_base_url }} bionic stable\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["9DC858229FC7DD38854AE2D88D81803C0EBFCD88"], "url": "{{ docker_ubuntu_repo_gpgkey }}"}, "docker_versioned_pkg": {"18.03": "docker-ce=18.03.1~ce-3-0~ubuntu", "18.06": "docker-ce=18.06.1~ce~3-0~ubuntu", "18.09": "docker-ce_18.09.1~3-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-ce=18.06.1~ce~3-0~ubuntu", "latest": "docker-ce", "stable": "docker-ce=18.06.1~ce~3-0~ubuntu"}, "use_docker_engine": false}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/ubuntu-bionic.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/vars/../vars/ubuntu-bionic.yml"} | |
TASK [container-engine/docker : Warn about Docker version on SUSE] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.183) 0:00:37.006 ******* | |
TASK [container-engine/docker : include_tasks] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.062) 0:00:37.068 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/container-engine/docker/tasks/set_facts_dns.yml for monstrinho | |
TASK [container-engine/docker : set dns server for docker] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.121) 0:00:37.189 ******* | |
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": []}, "changed": false} | |
TASK [container-engine/docker : show docker_dns_servers] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.258) 0:00:37.448 ******* | |
ok: [monstrinho] => { | |
"msg": [] | |
} | |
TASK [container-engine/docker : set base docker dns facts] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:18 -0200 (0:00:00.269) 0:00:37.718 ******* | |
ok: [monstrinho] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
TASK [container-engine/docker : add upstream dns servers (only when dnsmasq is not used)] **************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.157) 0:00:37.876 ******* | |
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": []}, "changed": false} | |
TASK [container-engine/docker : add global searchdomains] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.155) 0:00:38.031 ******* | |
ok: [monstrinho] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
TASK [container-engine/docker : check system nameservers] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.161) 0:00:38.193 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002388", "end": "2019-01-29 13:10:20.661013", "rc": 0, "start": "2019-01-29 13:10:20.658625", "stderr": "", "stderr_lines": [], "stdout": "127.0.0.53", "stdout_lines": ["127.0.0.53"]} | |
TASK [container-engine/docker : check system search domains] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:19 -0200 (0:00:00.490) 0:00:38.683 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002721", "end": "2019-01-29 13:10:21.197289", "rc": 0, "start": "2019-01-29 13:10:21.194568", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [container-engine/docker : add system nameservers to docker options] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.448) 0:00:39.131 ******* | |
ok: [monstrinho] => {"ansible_facts": {"docker_dns_servers": ["127.0.0.53"]}, "changed": false} | |
TASK [container-engine/docker : add system search domains to docker options] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.318) 0:00:39.450 ******* | |
TASK [container-engine/docker : check number of nameservers] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.070) 0:00:39.521 ******* | |
TASK [container-engine/docker : rtrim number of nameservers to 3] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.087) 0:00:39.609 ******* | |
TASK [container-engine/docker : check number of search domains] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.092) 0:00:39.701 ******* | |
TASK [container-engine/docker : check length of search domains] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:20 -0200 (0:00:00.090) 0:00:39.792 ******* | |
TASK [container-engine/docker : check for minimum kernel version] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:21 -0200 (0:00:00.084) 0:00:39.877 ******* | |
TASK [container-engine/docker : Ensure old versions of Docker are not installed. | Debian] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:21 -0200 (0:00:00.068) 0:00:39.945 ******* | |
ok: [monstrinho] => (item=docker) => {"changed": false, "item": "docker"} | |
ok: [monstrinho] => (item=docker-engine) => {"changed": false, "item": "docker-engine"} | |
ok: [monstrinho] => (item=docker.io) => {"changed": false, "item": "docker.io"} | |
TASK [container-engine/docker : Ensure old versions of Docker are not installed. | RedHat] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:23 -0200 (0:00:02.260) 0:00:42.205 ******* | |
TASK [container-engine/docker : ensure docker-ce repository public key is installed] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:23 -0200 (0:00:00.399) 0:00:42.604 ******* | |
ok: [monstrinho] => (item=9DC858229FC7DD38854AE2D88D81803C0EBFCD88) => {"attempts": 1, "changed": false, "item": "9DC858229FC7DD38854AE2D88D81803C0EBFCD88"} | |
TASK [container-engine/docker : ensure docker-ce repository is enabled] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:24 -0200 (0:00:00.744) 0:00:43.349 ******* | |
ok: [monstrinho] => (item=deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable | |
) => {"changed": false, "item": "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable\n", "repo": "deb [arch=amd64] https://download.docker.com/linux/ubuntu bionic stable\n", "state": "present"} | |
TASK [container-engine/docker : ensure docker-engine repository public key is installed] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.796) 0:00:44.145 ******* | |
TASK [container-engine/docker : ensure docker-engine repository is enabled] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.092) 0:00:44.238 ******* | |
TASK [container-engine/docker : Configure docker repository on Fedora] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.098) 0:00:44.337 ******* | |
TASK [container-engine/docker : Configure docker repository on RedHat/CentOS] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.068) 0:00:44.405 ******* | |
TASK [container-engine/docker : Copy yum.conf for editing] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.073) 0:00:44.478 ******* | |
TASK [container-engine/docker : Edit copy of yum.conf to set obsoletes=0] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.078) 0:00:44.557 ******* | |
TASK [container-engine/docker : ensure docker packages are installed] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:25 -0200 (0:00:00.067) 0:00:44.625 ******* | |
ok: [monstrinho] => (item={u'force': True, u'name': u'docker-ce=18.06.1~ce~3-0~ubuntu'}) => {"attempts": 1, "cache_update_time": 1548774628, "cache_updated": true, "changed": false, "item": {"force": true, "name": "docker-ce=18.06.1~ce~3-0~ubuntu"}} | |
TASK [container-engine/docker : Ensure docker packages are installed] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:28 -0200 (0:00:02.746) 0:00:47.371 ******* | |
TASK [container-engine/docker : get available packages on Ubuntu] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.102) 0:00:47.474 ******* | |
TASK [container-engine/docker : show available packages on ubuntu] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.085) 0:00:47.559 ******* | |
TASK [container-engine/docker : Set docker pin priority to apt_preferences on Debian family] ************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:28 -0200 (0:00:00.076) 0:00:47.636 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "acd87895af22b9d6cde191838650b769441e2809", "dest": "/etc/apt/preferences.d/docker", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/apt/preferences.d/docker", "size": 58, "state": "file", "uid": 0} | |
TASK [container-engine/docker : ensure service is started if docker packages are already present] ******************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:29 -0200 (0:00:00.608) 0:00:48.244 ******* | |
ok: [monstrinho] => {"changed": false, "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:41:49 -02", "ActiveEnterTimestampMonotonic": "2592753890", "ActiveExitTimestamp": "Tue 2019-01-29 12:28:45 -02", "ActiveExitTimestampMonotonic": "1808281283", "ActiveState": "active", "After": "network.target docker.socket basic.target system.slice sysinit.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:41:48 -02", "AssertTimestampMonotonic": "2592073029", "Before": "kubelet.service multi-user.target shutdown.target etcd.service", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:41:48 -02", "ConditionTimestampMonotonic": "2592073029", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "DelegateControllers": "cpu cpuacct io blkio memory devices pids", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "DynamicUser": "no", "Environment": "[unprintable] GOTRACEBACK=crash [unprintable] [unprintable]", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "17310", "ExecMainStartTimestamp": "Tue 2019-01-29 12:41:48 -02", "ExecMainStartTimestampMonotonic": "2592073894", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:38:46 -02", "InactiveEnterTimestampMonotonic": "2410133250", "InactiveExitTimestamp": "Tue 2019-01-29 12:41:48 -02", "InactiveExitTimestampMonotonic": "2592073929", "InvocationID": "4ab310c4adb748789373d6d2bb8bfdfb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "process", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "17310", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "system.slice sysinit.target", "Restart": "on-failure", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitIntervalUSec": "1min", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:41:49 -02", "StateChangeTimestampMonotonic": "2592753890", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "10", "TasksMax": "infinity", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:41:49 -02", "WatchdogTimestampMonotonic": "2592753886", "WatchdogUSec": "0"}} | |
[WARNING]: flush_handlers task does not support when conditional | |
TASK [container-engine/docker : set fact for docker_version] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:29 -0200 (0:00:00.561) 0:00:48.806 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.043669", "end": "2019-01-29 13:10:31.540195", "rc": 0, "start": "2019-01-29 13:10:31.496526", "stderr": "", "stderr_lines": [], "stdout": "18.06.1-ce", "stdout_lines": ["18.06.1-ce"]} | |
TASK [container-engine/docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] *********************************************************************************** | |
Tuesday 29 January 2019 13:10:30 -0200 (0:00:00.781) 0:00:49.588 ******* | |
TASK [container-engine/docker : Create docker service systemd directory if it doesn't exist] ************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:30 -0200 (0:00:00.075) 0:00:49.663 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4, "state": "directory", "uid": 0} | |
TASK [container-engine/docker : Write docker proxy drop-in] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:31 -0200 (0:00:00.534) 0:00:50.198 ******* | |
TASK [container-engine/docker : get systemd version] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:31 -0200 (0:00:00.077) 0:00:50.275 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "systemctl --version | head -n 1 | cut -d \" \" -f 2", "delta": "0:00:00.003423", "end": "2019-01-29 13:10:32.875497", "rc": 0, "start": "2019-01-29 13:10:32.872074", "stderr": "", "stderr_lines": [], "stdout": "237", "stdout_lines": ["237"]} | |
TASK [container-engine/docker : Write docker.service systemd file] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:32 -0200 (0:00:00.601) 0:00:50.877 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "828d939fd2bd760bf0dd161afbc331320a68673d", "dest": "/etc/systemd/system/docker.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 751, "state": "file", "uid": 0} | |
TASK [container-engine/docker : Write docker options systemd drop-in] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:33 -0200 (0:00:01.455) 0:00:52.332 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "75b0d34cd7c8ea384a129e671a67554d1078b48a", "dest": "/etc/systemd/system/docker.service.d/docker-options.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 127, "state": "file", "uid": 0} | |
TASK [container-engine/docker : Write docker dns systemd drop-in] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.599) 0:00:52.931 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "692ffdda1bb6fb69d93563dd17d083c9948c7e71", "dest": "/etc/systemd/system/docker.service.d/docker-dns.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 212, "state": "file", "uid": 0} | |
TASK [container-engine/docker : Copy docker orphan clean up script to the node] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.677) 0:00:53.609 ******* | |
TASK [container-engine/docker : Write docker orphan clean up systemd drop-in] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.108) 0:00:53.718 ******* | |
TASK [container-engine/docker : ensure docker service is started and enabled] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:34 -0200 (0:00:00.092) 0:00:53.811 ******* | |
ok: [monstrinho] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:41:49 -02", "ActiveEnterTimestampMonotonic": "2592753890", "ActiveExitTimestamp": "Tue 2019-01-29 12:28:45 -02", "ActiveExitTimestampMonotonic": "1808281283", "ActiveState": "active", "After": "network.target docker.socket basic.target system.slice sysinit.target systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:41:48 -02", "AssertTimestampMonotonic": "2592073029", "Before": "kubelet.service multi-user.target shutdown.target etcd.service", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:41:48 -02", "ConditionTimestampMonotonic": "2592073029", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "DelegateControllers": "cpu cpuacct io blkio memory devices pids", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "DynamicUser": "no", "Environment": "[unprintable] GOTRACEBACK=crash [unprintable] [unprintable]", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "17310", "ExecMainStartTimestamp": "Tue 2019-01-29 12:41:48 -02", "ExecMainStartTimestampMonotonic": "2592073894", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:38:46 -02", "InactiveEnterTimestampMonotonic": "2410133250", "InactiveExitTimestamp": "Tue 2019-01-29 12:41:48 -02", "InactiveExitTimestampMonotonic": "2592073929", "InvocationID": "4ab310c4adb748789373d6d2bb8bfdfb", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "process", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "17310", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "system.slice sysinit.target", "Restart": "on-failure", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "3", "StartLimitIntervalUSec": "1min", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:41:49 -02", "StateChangeTimestampMonotonic": "2592753890", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "10", "TasksMax": "infinity", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:41:49 -02", "WatchdogTimestampMonotonic": "2592753886", "WatchdogUSec": "0"}} | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.406) 0:00:54.217 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_prep.yml for monstrinho | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.099) 0:00:54.316 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : container_download | Create dest directory for saved/loaded container images] *********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:35 -0200 (0:00:00.502) 0:00:54.819 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases/containers", "size": 40, "state": "directory", "uid": 30033} | |
TASK [download : container_download | create local directory for saved/loaded container images] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:36 -0200 (0:00:00.451) 0:00:55.271 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:36 -0200 (0:00:00.083) 0:00:55.354 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'dnsautoscaler', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/cluster-proportional-autoscaler-amd64', u'tag': u'1.3.0', u'groups': [u'kube-node'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'pod_infra', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/pause-amd64', u'tag': u'3.1', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'etcd', 'value': {u'unarchive': True, u'container': True, u'groups': [u'etcd'], u'dest': u'/tmp/releases/etcd-v3.2.24-linux-amd64.tar.gz', u'version': u'v3.2.24', u'enabled': True, u'repo': u'quay.io/coreos/etcd', u'url': u'https://github.com/coreos/etcd/releases/download/v3.2.24/etcd-v3.2.24-linux-amd64.tar.gz', u'tag': u'v3.2.24', u'mode': u'0755', u'file': False, u'owner': u'root', u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'kubeadm', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/kubeadm', u'enabled': True, u'url': u'https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm', u'version': u'v1.13.2', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'7cb0ce57c1e6e2d85e05de3780a2f35a191fe93f89cfc5816b424efcf39834b9'}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'hyperkube_file', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/hyperkube', u'enabled': True, u'url': u'https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube', u'version': u'v1.13.2', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'f159b587ec80ad03bf3b9bb09de5d64b773d01b0e34f2a4f1c816879c56aae6d'}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'nginx', 'value': {u'container': True, u'enabled': True, u'repo': u'nginx', u'tag': 1.13, u'groups': [u'kube-node'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'dashboard', 'value': {u'container': True, u'enabled': True, u'repo': u'gcr.io/google_containers/kubernetes-dashboard-amd64', u'tag': u'v1.10.1', u'groups': [u'kube-master'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_policy', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/kube-controllers', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calicoctl', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/ctl', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_file.yml for monstrinho => (item={'key': u'cni', 'value': {u'unarchive': False, u'file': True, u'dest': u'/tmp/releases/cni-plugins-amd64-v0.6.0.tgz', u'enabled': True, u'url': u'https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz', u'version': u'v0.6.0', u'mode': u'0755', u'groups': [u'k8s-cluster'], u'owner': u'root', u'sha256': u'f04339a21b8edf76d415e7f17b620e63b8f37a76b2f706671587ab6464411f2d'}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_node', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/node', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'coredns', 'value': {u'container': True, u'enabled': True, u'repo': u'coredns/coredns', u'tag': u'1.2.6', u'groups': [u'kube-node'], u'sha256': u''}}) | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/download_container.yml for monstrinho => (item={'key': u'calico_cni', 'value': {u'container': True, u'enabled': True, u'repo': u'quay.io/calico/cni', u'tag': u'v3.1.3', u'groups': [u'k8s-cluster'], u'sha256': u''}}) | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:37 -0200 (0:00:01.456) 0:00:56.810 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.181) 0:00:56.992 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.180) 0:00:57.173 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.3.0"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.169) 0:00:57.343 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:38 -0200 (0:00:00.394) 0:00:57.738 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.170) 0:00:57.908 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.092) 0:00:58.001 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.056) 0:00:58.057 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.118) 0:00:58.176 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.171) 0:00:58.348 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.192) 0:00:58.541 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.1"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:39 -0200 (0:00:00.181) 0:00:58.722 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.418) 0:00:59.140 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": true}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.197) 0:00:59.338 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.093) 0:00:59.432 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:40 -0200 (0:00:00.054) 0:00:59.487 ******* | |
changed: [monstrinho] => {"attempts": 1, "changed": true, "cmd": ["/usr/bin/docker", "pull", "gcr.io/google_containers/pause-amd64:3.1"], "delta": "0:00:03.586579", "end": "2019-01-29 13:10:45.466574", "rc": 0, "start": "2019-01-29 13:10:41.879995", "stderr": "", "stderr_lines": [], "stdout": "3.1: Pulling from google_containers/pause-amd64\nDigest: sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610\nStatus: Image is up to date for gcr.io/google_containers/pause-amd64:3.1", "stdout_lines": ["3.1: Pulling from google_containers/pause-amd64", "Digest: sha256:59eec8837a4d942cc19a52b8c09ea75121acc38114a2c68b98983ce9356b8610", "Status: Image is up to date for gcr.io/google_containers/pause-amd64:3.1"]} | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:44 -0200 (0:00:03.940) 0:01:03.427 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:44 -0200 (0:00:00.197) 0:01:03.625 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:44 -0200 (0:00:00.176) 0:01:03.801 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.24"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.157) 0:01:03.959 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.541) 0:01:04.500 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.181) 0:01:04.681 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.090) 0:01:04.772 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:45 -0200 (0:00:00.060) 0:01:04.833 ******* | |
TASK [download : file_download | Downloading...] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.082) 0:01:04.915 ******* | |
ok: [monstrinho] => { | |
"msg": [ | |
"URL: https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm", | |
"Dest: /tmp/releases/kubeadm" | |
] | |
} | |
TASK [download : file_download | Create dest directory] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.176) 0:01:05.092 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033} | |
TASK [download : file_download | Download item] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:46 -0200 (0:00:00.367) 0:01:05.459 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/kubeadm", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 36407392, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/kubeadm"} | |
TASK [download : file_download | Extract archives] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.958) 0:01:06.418 ******* | |
TASK [download : file_download | Downloading...] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.083) 0:01:06.502 ******* | |
ok: [monstrinho] => { | |
"msg": [ | |
"URL: https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube", | |
"Dest: /tmp/releases/hyperkube" | |
] | |
} | |
TASK [download : file_download | Create dest directory] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:47 -0200 (0:00:00.189) 0:01:06.691 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033} | |
TASK [download : file_download | Download item] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:48 -0200 (0:00:00.310) 0:01:07.001 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/hyperkube", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 177749912, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/kubernetes-release/release/v1.13.2/bin/linux/amd64/hyperkube"} | |
TASK [download : file_download | Extract archives] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.931) 0:01:07.933 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.120) 0:01:08.054 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.177) 0:01:08.231 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.175) 0:01:08.406 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:49 -0200 (0:00:00.164) 0:01:08.571 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.451) 0:01:09.023 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.197) 0:01:09.221 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.123) 0:01:09.345 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.066) 0:01:09.411 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.121) 0:01:09.533 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:50 -0200 (0:00:00.175) 0:01:09.708 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.203) 0:01:09.911 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/kubernetes-dashboard-amd64:v1.10.1"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.177) 0:01:10.089 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.395) 0:01:10.485 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:51 -0200 (0:00:00.301) 0:01:10.787 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.103) 0:01:10.890 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.092) 0:01:10.983 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.111) 0:01:11.094 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.156) 0:01:11.250 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.295) 0:01:11.545 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/kube-controllers:v3.1.3"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:52 -0200 (0:00:00.282) 0:01:11.828 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.476) 0:01:12.304 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.194) 0:01:12.499 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.099) 0:01:12.599 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.070) 0:01:12.669 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:53 -0200 (0:00:00.118) 0:01:12.787 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.165) 0:01:12.953 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.174) 0:01:13.127 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v3.1.3"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.155) 0:01:13.283 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:54 -0200 (0:00:00.570) 0:01:13.854 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.320) 0:01:14.174 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.101) 0:01:14.276 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.071) 0:01:14.347 ******* | |
TASK [download : file_download | Downloading...] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.106) 0:01:14.454 ******* | |
ok: [monstrinho] => { | |
"msg": [ | |
"URL: https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz", | |
"Dest: /tmp/releases/cni-plugins-amd64-v0.6.0.tgz" | |
] | |
} | |
TASK [download : file_download | Create dest directory] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:55 -0200 (0:00:00.168) 0:01:14.623 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ansible", "path": "/tmp/releases", "size": 120, "state": "directory", "uid": 30033} | |
TASK [download : file_download | Download item] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.398) 0:01:15.021 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 15385105, "state": "file", "uid": 0, "url": "https://github.com/containernetworking/plugins/releases/download/v0.6.0/cni-plugins-amd64-v0.6.0.tgz"} | |
TASK [download : file_download | Extract archives] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.607) 0:01:15.629 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:56 -0200 (0:00:00.122) 0:01:15.752 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.156) 0:01:15.909 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.294) 0:01:16.203 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v3.1.3"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:57 -0200 (0:00:00.274) 0:01:16.478 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.691) 0:01:17.170 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.295) 0:01:17.465 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.089) 0:01:17.555 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.054) 0:01:17.610 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:58 -0200 (0:00:00.115) 0:01:17.725 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.155) 0:01:17.881 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.288) 0:01:18.170 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "coredns/coredns:1.2.6"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:10:59 -0200 (0:00:00.273) 0:01:18.443 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.745) 0:01:19.189 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.310) 0:01:19.500 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.087) 0:01:19.587 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.058) 0:01:19.646 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:00 -0200 (0:00:00.116) 0:01:19.762 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/set_docker_image_facts.yml for monstrinho | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.235) 0:01:19.997 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.166) 0:01:20.164 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v3.1.3"}, "changed": false} | |
TASK [download : Register docker images info] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.170) 0:01:20.334 ******* | |
ok: [monstrinho] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false} | |
TASK [download : set_fact] ******************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:01 -0200 (0:00:00.391) 0:01:20.725 ******* | |
ok: [monstrinho] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.179) 0:01:20.905 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.109) 0:01:21.014 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.056) 0:01:21.071 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:02 -0200 (0:00:00.089) 0:01:21.160 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.718) 0:01:21.879 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/download/tasks/kubeadm_images.yml for monstrinho | |
TASK [download : kubeadm | Create kubeadm config] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.110) 0:01:21.990 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "a8ce35abe6277befb5bacf96f55aca24fa1bcf55", "dest": "/etc/kubernetes/kubeadm-images.yaml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubeadm-images.yaml", "size": 250, "state": "file", "uid": 0} | |
TASK [download : container_download | download images for kubeadm config images] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:03 -0200 (0:00:00.501) 0:01:22.491 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/tmp/releases/kubeadm", "config", "images", "pull", "--config=/etc/kubernetes/kubeadm-images.yaml"], "delta": "0:00:34.123483", "end": "2019-01-29 13:11:38.944545", "rc": 0, "start": "2019-01-29 13:11:04.821062", "stderr": "", "stderr_lines": [], "stdout": "[config/images] Pulled gcr.io/google-containers/kube-apiserver:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-controller-manager:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-scheduler:v1.13.2\n[config/images] Pulled gcr.io/google-containers/kube-proxy:v1.13.2\n[config/images] Pulled gcr.io/google-containers/pause:3.1\n[config/images] Pulled gcr.io/google-containers/etcd:3.2.24\n[config/images] Pulled gcr.io/google-containers/coredns:1.2.6", "stdout_lines": ["[config/images] Pulled gcr.io/google-containers/kube-apiserver:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-controller-manager:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-scheduler:v1.13.2", "[config/images] Pulled gcr.io/google-containers/kube-proxy:v1.13.2", "[config/images] Pulled gcr.io/google-containers/pause:3.1", "[config/images] Pulled gcr.io/google-containers/etcd:3.2.24", "[config/images] Pulled gcr.io/google-containers/coredns:1.2.6"]} | |
PLAY [etcd] ********************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:38 -0200 (0:00:34.410) 0:01:56.902 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:38 -0200 (0:00:00.057) 0:01:56.960 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:38 -0200 (0:00:00.531) 0:01:57.492 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.520) 0:01:58.013 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.052) 0:01:58.066 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.125) 0:01:58.191 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:39 -0200 (0:00:00.448) 0:01:58.640 ******* | |
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
TASK [etcd : set_fact] *********************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.337) 0:01:58.978 ******* | |
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false} | |
TASK [etcd : ansible_architecture_rename] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.126) 0:01:59.104 ******* | |
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.131) 0:01:59.235 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/check_certs.yml for monstrinho | |
TASK [etcd : Check_certs | check if all certs have already been generated on first master] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:40 -0200 (0:00:00.116) 0:01:59.351 ******* | |
ok: [monstrinho -> None] => {"changed": false, "examined": 8, "files": [{"atime": 1548773301.5338123, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548773290.621881, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "e590f0516331d7b58adb60882dc73e278ff2aa67", "ctime": 1548773290.7298803, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201532, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0546799, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1371, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548773290.8538795, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 3, "msg": ""} | |
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ******************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.668) 0:02:00.019 ******* | |
ok: [monstrinho] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
TASK [etcd : Check certs | check if a cert already exists on node] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.127) 0:02:00.147 ******* | |
ok: [monstrinho] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1548773301.5338123, "attr_flags": "", "attributes": [], "block_size": 1536, "blocks": 9, "charset": "us-ascii", "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548773290.621881, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [monstrinho] => (item=node-monstrinho-key.pem) => {"changed": false, "item": "node-monstrinho-key.pem", "stat": {"atime": 1548773301.5338123, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548773290.8538795, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [etcd : Check_certs | Set 'gen_certs' to true] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:41 -0200 (0:00:00.692) 0:02:00.839 ******* | |
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.072) 0:02:00.912 ******* | |
ok: [monstrinho] => {"ansible_facts": {"gen_node_certs": {"monstrinho": false}}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.139) 0:02:01.052 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.067) 0:02:01.119 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/gen_certs_script.yml for monstrinho | |
TASK [etcd : Gen_certs | create etcd cert dir] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.109) 0:02:01.229 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | create etcd script dir (on monstrinho)] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:42 -0200 (0:00:00.400) 0:02:01.630 ******* | |
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 3, "state": "directory", "uid": 0} | |
TASK [etcd : Gen_certs | create etcd cert dir (on monstrinho)] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.295) 0:02:01.925 ******* | |
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | write openssl config] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.299) 0:02:02.225 ******* | |
TASK [etcd : Gen_certs | copy certs generation script] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.078) 0:02:02.303 ******* | |
TASK [etcd : Gen_certs | run cert generation script] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.075) 0:02:02.379 ******* | |
TASK [etcd : Gen_certs | Gather etcd master certs] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.098) 0:02:02.478 ******* | |
TASK [etcd : Gen_certs | Write etcd master certs] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.119) 0:02:02.597 ******* | |
TASK [etcd : set_fact] *********************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.124) 0:02:02.722 ******* | |
ok: [monstrinho] => {"ansible_facts": {"my_etcd_node_certs": ["ca.pem", "node-monstrinho.pem", "node-monstrinho-key.pem"]}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true on nodes] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:43 -0200 (0:00:00.124) 0:02:02.847 ******* | |
TASK [etcd : Gen_certs | Gather node certs] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.098) 0:02:02.945 ******* | |
TASK [etcd : Gen_certs | Copy certs on nodes] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.053) 0:02:02.998 ******* | |
TASK [etcd : Gen_certs | check certificate permissions] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.053) 0:02:03.052 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.258) 0:02:03.311 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/upd_ca_trust.yml for monstrinho | |
TASK [etcd : Gen_certs | target ca-certificate store file] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.101) 0:02:03.412 ******* | |
ok: [monstrinho] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
TASK [etcd : Gen_certs | add CA to trusted CA dir] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:44 -0200 (0:00:00.134) 0:02:03.546 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "14613aede44b0876f06006de7aed68f5", "mode": "0644", "owner": "root", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.555) 0:02:04.102 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.059) 0:02:04.162 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (ClearLinux)] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.057) 0:02:04.219 ******* | |
TASK [etcd : Gen_certs | Get etcd certificate serials] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.054) 0:02:04.274 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["openssl", "x509", "-in", "/etc/ssl/etcd/ssl/node-monstrinho.pem", "-noout", "-serial"], "delta": "0:00:00.003531", "end": "2019-01-29 13:11:46.637935", "rc": 0, "start": "2019-01-29 13:11:46.634404", "stderr": "", "stderr_lines": [], "stdout": "serial=ED526DC0615FFF3B", "stdout_lines": ["serial=ED526DC0615FFF3B"]} | |
TASK [etcd : Set etcd_client_cert_serial] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.286) 0:02:04.560 ******* | |
ok: [monstrinho] => {"ansible_facts": {"etcd_client_cert_serial": "ED526DC0615FFF3B"}, "changed": false} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.144) 0:02:04.704 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/install_docker.yml for monstrinho | |
TASK [etcd : Install | Copy etcdctl binary from docker container] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:45 -0200 (0:00:00.096) 0:02:04.800 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.24 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.916520", "end": "2019-01-29 13:11:48.067129", "rc": 0, "start": "2019-01-29 13:11:47.150609", "stderr": "Error: No such container: etcdctl-binarycopy", "stderr_lines": ["Error: No such container: etcdctl-binarycopy"], "stdout": "49a6e4db9ad4faefcb0e71077894753b3945593b43a25009c624028dbf8fea5a\netcdctl-binarycopy", "stdout_lines": ["49a6e4db9ad4faefcb0e71077894753b3945593b43a25009c624028dbf8fea5a", "etcdctl-binarycopy"]} | |
TASK [etcd : Install etcd launch script] ***************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:47 -0200 (0:00:01.210) 0:02:06.010 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "d9ff177a4c496629c590ce07b1c27aa61d7566a4", "dest": "/usr/local/bin/etcd", "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/usr/local/bin/etcd", "size": 348, "state": "file", "uid": 0} | |
TASK [etcd : Install etcd-events launch script] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.496) 0:02:06.507 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.054) 0:02:06.561 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/configure.yml for monstrinho | |
TASK [etcd : Configure | Check if etcd cluster is healthy] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:47 -0200 (0:00:00.129) 0:02:06.691 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.0.1.2:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.028444", "end": "2019-01-29 13:11:49.105860", "rc": 0, "start": "2019-01-29 13:11:49.077416", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Check if etcd-events cluster is healthy] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.337) 0:02:07.029 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.060) 0:02:07.089 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.086) 0:02:07.176 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0} | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:48 -0200 (0:00:00.660) 0:02:07.836 ******* | |
TASK [etcd : Configure | Copy etcd.service systemd file] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.061) 0:02:07.898 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "dest": "/etc/systemd/system/etcd.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/etcd.service", "size": 354, "state": "file", "uid": 0} | |
TASK [etcd : Configure | Copy etcd-events.service systemd file] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.465) 0:02:08.363 ******* | |
TASK [etcd : Configure | reload systemd] ***************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:49 -0200 (0:00:00.068) 0:02:08.432 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.215429", "end": "2019-01-29 13:11:51.034996", "rc": 0, "start": "2019-01-29 13:11:50.819567", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Ensure etcd is running] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.538) 0:02:08.971 ******* | |
ok: [monstrinho] => {"changed": false, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:46:27 -02", "ActiveEnterTimestampMonotonic": "2870195592", "ActiveExitTimestamp": "Tue 2019-01-29 12:46:25 -02", "ActiveExitTimestampMonotonic": "2868351409", "ActiveState": "active", "After": "docker.service systemd-journald.socket sysinit.target system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:46:26 -02", "AssertTimestampMonotonic": "2870028779", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:46:26 -02", "ConditionTimestampMonotonic": "2870028778", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "DynamicUser": "no", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "29685", "ExecMainStartTimestamp": "Tue 2019-01-29 12:46:27 -02", "ExecMainStartTimestampMonotonic": "2870195492", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GID": "0", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:46:26 -02", "InactiveEnterTimestampMonotonic": "2870026830", "InactiveExitTimestamp": "Tue 2019-01-29 12:46:26 -02", "InactiveExitTimestampMonotonic": "2870031500", "InvocationID": "729133dab4db4143b1320b3208e1a169", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "30478", "LimitNPROCSoft": "30478", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "29685", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice", "Restart": "always", "RestartUSec": "15s", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:46:27 -02", "StateChangeTimestampMonotonic": "2870197198", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "12", "TasksMax": "4915", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UID": "0", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:46:27 -02", "WatchdogTimestampMonotonic": "2870195590", "WatchdogUSec": "0"}} | |
TASK [etcd : Configure | Ensure etcd-events is running] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.436) 0:02:09.408 ******* | |
TASK [etcd : Configure | Check if etcd cluster is healthy] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.058) 0:02:09.467 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.0.1.2:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.024828", "end": "2019-01-29 13:11:51.918986", "rc": 0, "start": "2019-01-29 13:11:51.894158", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Check if etcd-events cluster is healthy] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:50 -0200 (0:00:00.378) 0:02:09.845 ******* | |
TASK [etcd : Configure | Check if member is in etcd cluster] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.069) 0:02:09.915 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.0.1.2:2379 member list | grep -q 10.0.1.2", "delta": "0:00:00.016063", "end": "2019-01-29 13:11:52.351182", "rc": 0, "start": "2019-01-29 13:11:52.335119", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Check if member is in etcd-events cluster] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.360) 0:02:10.275 ******* | |
TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.067) 0:02:10.343 ******* | |
TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.069) 0:02:10.413 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.063) 0:02:10.477 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:51 -0200 (0:00:00.106) 0:02:10.583 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0} | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.772) 0:02:11.356 ******* | |
TASK [etcd : Restart etcd if certs changed] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.067) 0:02:11.423 ******* | |
TASK [etcd : Restart etcd-events if certs changed] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.070) 0:02:11.494 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.062) 0:02:11.556 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:52 -0200 (0:00:00.093) 0:02:11.649 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "b371eb152d33b56b88594d946332afcc783fb349", "dest": "/etc/etcd.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 977, "state": "file", "uid": 0} | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:53 -0200 (0:00:01.170) 0:02:12.820 ******* | |
PLAY [k8s-cluster:calico-rr] ***************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.079) 0:02:12.899 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.056) 0:02:12.956 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:54 -0200 (0:00:00.522) 0:02:13.478 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.635) 0:02:14.114 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.053) 0:02:14.167 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:55 -0200 (0:00:00.249) 0:02:14.417 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.500) 0:02:14.917 ******* | |
ok: [monstrinho] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
TASK [etcd : set_fact] *********************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.413) 0:02:15.330 ******* | |
ok: [monstrinho] => {"ansible_facts": {"architecture_groups": {"aarch64": "arm64", "x86_64": "amd64"}}, "changed": false} | |
TASK [etcd : ansible_architecture_rename] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.246) 0:02:15.577 ******* | |
ok: [monstrinho] => {"ansible_facts": {"host_architecture": "amd64"}, "changed": false} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:56 -0200 (0:00:00.246) 0:02:15.824 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/check_certs.yml for monstrinho | |
TASK [etcd : Check_certs | check if all certs have already been generated on first master] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.103) 0:02:15.928 ******* | |
ok: [monstrinho -> None] => {"changed": false, "examined": 8, "files": [{"atime": 1548774706.167716, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548774706.6357317, "checksum": "e590f0516331d7b58adb60882dc73e278ff2aa67", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201532, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0546799, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1371, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1548773301.5338123, "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548774705.3836899, "dev": 26, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 3, "msg": ""} | |
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ******************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.391) 0:02:16.319 ******* | |
ok: [monstrinho] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
TASK [etcd : Check certs | check if a cert already exists on node] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:57 -0200 (0:00:00.258) 0:02:16.577 ******* | |
ok: [monstrinho] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1548774706.167716, "attr_flags": "", "attributes": [], "block_size": 1536, "blocks": 9, "charset": "us-ascii", "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "ctime": 1548774705.3836899, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201528, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773148.806681, "nlink": 2, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1094, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [monstrinho] => (item=node-monstrinho-key.pem) => {"changed": false, "item": "node-monstrinho-key.pem", "stat": {"atime": 1548774718.3921177, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "d11a3226ca45743408c67bc4138d70b5a1c3147a", "ctime": 1548774705.3836899, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201531, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0640", "mtime": 1548773149.0466797, "nlink": 2, "path": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "pw_name": "kube", "readable": true, "rgrp": true, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [etcd : Check_certs | Set 'gen_certs' to true] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.496) 0:02:17.074 ******* | |
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.073) 0:02:17.148 ******* | |
ok: [monstrinho] => {"ansible_facts": {"gen_node_certs": {"monstrinho": false}}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.262) 0:02:17.410 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.069) 0:02:17.479 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/gen_certs_script.yml for monstrinho | |
TASK [etcd : Gen_certs | create etcd cert dir] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:58 -0200 (0:00:00.289) 0:02:17.768 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | create etcd script dir (on monstrinho)] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.265) 0:02:18.034 ******* | |
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 3, "state": "directory", "uid": 0} | |
TASK [etcd : Gen_certs | create etcd cert dir (on monstrinho)] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.290) 0:02:18.325 ******* | |
ok: [monstrinho -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | write openssl config] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.274) 0:02:18.600 ******* | |
TASK [etcd : Gen_certs | copy certs generation script] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.076) 0:02:18.677 ******* | |
TASK [etcd : Gen_certs | run cert generation script] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.075) 0:02:18.753 ******* | |
TASK [etcd : Gen_certs | Gather etcd master certs] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:11:59 -0200 (0:00:00.092) 0:02:18.845 ******* | |
TASK [etcd : Gen_certs | Write etcd master certs] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.134) 0:02:18.980 ******* | |
TASK [etcd : set_fact] *********************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.138) 0:02:19.119 ******* | |
ok: [monstrinho] => {"ansible_facts": {"my_etcd_node_certs": ["ca.pem", "node-monstrinho.pem", "node-monstrinho-key.pem"]}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true on nodes] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.130) 0:02:19.250 ******* | |
TASK [etcd : Gen_certs | Gather node certs] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.106) 0:02:19.356 ******* | |
TASK [etcd : Gen_certs | Copy certs on nodes] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.057) 0:02:19.413 ******* | |
TASK [etcd : Gen_certs | check certificate permissions] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.063) 0:02:19.477 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0640", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 10, "state": "directory", "uid": 999} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:00 -0200 (0:00:00.309) 0:02:19.787 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/upd_ca_trust.yml for monstrinho | |
TASK [etcd : Gen_certs | target ca-certificate store file] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.118) 0:02:19.905 ******* | |
ok: [monstrinho] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
TASK [etcd : Gen_certs | add CA to trusted CA dir] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.161) 0:02:20.067 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "f7e4401df300f1d8e326c92185a7ef0f9a068af3", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "14613aede44b0876f06006de7aed68f5", "mode": "0644", "owner": "root", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS)] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.336) 0:02:20.403 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.058) 0:02:20.462 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (ClearLinux)] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.060) 0:02:20.522 ******* | |
TASK [etcd : Gen_certs | Get etcd certificate serials] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.060) 0:02:20.583 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["openssl", "x509", "-in", "/etc/ssl/etcd/ssl/node-monstrinho.pem", "-noout", "-serial"], "delta": "0:00:00.003418", "end": "2019-01-29 13:12:02.936531", "rc": 0, "start": "2019-01-29 13:12:02.933113", "stderr": "", "stderr_lines": [], "stdout": "serial=ED526DC0615FFF3B", "stdout_lines": ["serial=ED526DC0615FFF3B"]} | |
TASK [etcd : Set etcd_client_cert_serial] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:01 -0200 (0:00:00.276) 0:02:20.860 ******* | |
ok: [monstrinho] => {"ansible_facts": {"etcd_client_cert_serial": "ED526DC0615FFF3B"}, "changed": false} | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.158) 0:02:21.018 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/install_docker.yml for monstrinho | |
TASK [etcd : Install | Copy etcdctl binary from docker container] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.098) 0:02:21.117 ******* | |
TASK [etcd : Install etcd launch script] ***************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.058) 0:02:21.176 ******* | |
TASK [etcd : Install etcd-events launch script] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.058) 0:02:21.234 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.059) 0:02:21.294 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/configure.yml for monstrinho | |
TASK [etcd : Configure | Check if etcd cluster is healthy] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.116) 0:02:21.410 ******* | |
TASK [etcd : Configure | Check if etcd-events cluster is healthy] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.070) 0:02:21.480 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.067) 0:02:21.548 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.103) 0:02:21.651 ******* | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.068) 0:02:21.720 ******* | |
TASK [etcd : Configure | Copy etcd.service systemd file] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.063) 0:02:21.784 ******* | |
TASK [etcd : Configure | Copy etcd-events.service systemd file] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:02 -0200 (0:00:00.069) 0:02:21.853 ******* | |
TASK [etcd : Configure | reload systemd] ***************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.062) 0:02:21.916 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["systemctl", "daemon-reload"], "delta": "0:00:00.179003", "end": "2019-01-29 13:12:04.415675", "rc": 0, "start": "2019-01-29 13:12:04.236672", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Ensure etcd is running] ********************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.424) 0:02:22.341 ******* | |
TASK [etcd : Configure | Ensure etcd-events is running] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.081) 0:02:22.423 ******* | |
TASK [etcd : Configure | Check if etcd cluster is healthy] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.066) 0:02:22.489 ******* | |
TASK [etcd : Configure | Check if etcd-events cluster is healthy] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.074) 0:02:22.564 ******* | |
TASK [etcd : Configure | Check if member is in etcd cluster] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.067) 0:02:22.631 ******* | |
TASK [etcd : Configure | Check if member is in etcd-events cluster] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.070) 0:02:22.702 ******* | |
TASK [etcd : Configure | Join member(s) to etcd cluster one at a time] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.069) 0:02:22.771 ******* | |
TASK [etcd : Configure | Join member(s) to etcd-events cluster one at a time] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:03 -0200 (0:00:00.075) 0:02:22.847 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.074) 0:02:22.921 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.090) 0:02:23.012 ******* | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.071) 0:02:23.084 ******* | |
TASK [etcd : Restart etcd if certs changed] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.058) 0:02:23.143 ******* | |
TASK [etcd : Restart etcd-events if certs changed] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.060) 0:02:23.203 ******* | |
TASK [etcd : include_tasks] ****************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.060) 0:02:23.263 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/etcd/tasks/refresh_config.yml for monstrinho | |
TASK [etcd : Refresh config | Create etcd config file] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.105) 0:02:23.369 ******* | |
TASK [etcd : Refresh config | Create etcd-events config file] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.067) 0:02:23.437 ******* | |
PLAY [k8s-cluster] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.095) 0:02:23.532 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:04 -0200 (0:00:00.067) 0:02:23.600 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.562) 0:02:24.163 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.639) 0:02:24.803 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:05 -0200 (0:00:00.055) 0:02:24.858 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/node : look up docker cgroup driver] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.142) 0:02:25.000 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "docker info | grep 'Cgroup Driver' | awk -F': ' '{ print $2; }'", "delta": "0:00:00.078746", "end": "2019-01-29 13:12:07.415987", "rc": 0, "start": "2019-01-29 13:12:07.337241", "stderr": "WARNING: No swap limit support", "stderr_lines": ["WARNING: No swap limit support"], "stdout": "cgroupfs", "stdout_lines": ["cgroupfs"]} | |
TASK [kubernetes/node : set_fact] ************************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.350) 0:02:25.351 ******* | |
ok: [monstrinho] => {"ansible_facts": {"kubelet_cgroup_driver_detected": "cgroupfs", "standalone_kubelet": false}, "changed": false} | |
TASK [kubernetes/node : os specific vars] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.139) 0:02:25.490 ******* | |
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml) => {"ansible_facts": {"kube_resolv_conf": "/run/systemd/resolve/resolv.conf"}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes/node/vars/ubuntu-18.yml"} | |
TASK [kubernetes/node : Pre-upgrade | check if kubelet container exists] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:06 -0200 (0:00:00.156) 0:02:25.646 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "docker ps -af name=kubelet | grep kubelet", "delta": "0:00:00.044863", "end": "2019-01-29 13:12:08.027410", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:12:07.982547", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/node : Pre-upgrade | copy /var/lib/cni from kubelet] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.436) 0:02:26.083 ******* | |
TASK [kubernetes/node : Pre-upgrade | ensure kubelet container service is stopped if using host deployment] ********************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.064) 0:02:26.148 ******* | |
TASK [kubernetes/node : Pre-upgrade | ensure kubelet container is removed if using host deployment] ****************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.053) 0:02:26.201 ******* | |
TASK [kubernetes/node : Ensure /var/lib/cni exists] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.050) 0:02:26.252 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/lib/cni", "size": 2, "state": "directory", "uid": 0} | |
TASK [kubernetes/node : install | Copy kubeadm binary from download dir] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:07 -0200 (0:00:00.461) 0:02:26.713 ******* | |
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/kubeadm /usr/local/bin/kubeadm", "msg": "", "rc": 0, "stdout_lines": []} | |
TASK [kubernetes/node : install | Set kubeadm binary permissions] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:08 -0200 (0:00:00.656) 0:02:27.369 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubeadm", "size": 36407392, "state": "file", "uid": 0} | |
TASK [kubernetes/node : install | Copy kubelet binary from download dir] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:08 -0200 (0:00:00.302) 0:02:27.672 ******* | |
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/hyperkube /usr/local/bin/kubelet", "msg": "", "rc": 0, "stdout_lines": []} | |
TASK [kubernetes/node : install | Set kubelet binary permissions] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.429) 0:02:28.101 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubelet", "size": 177749912, "state": "file", "uid": 0} | |
TASK [kubernetes/node : install | Copy socat wrapper for Container Linux] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.360) 0:02:28.461 ******* | |
TASK [kubernetes/node : install | Write kubelet systemd init file] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:09 -0200 (0:00:00.051) 0:02:28.512 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "6776d5c1dc7ceb83b0ae25cbc09694a8a8a18f01", "dest": "/etc/systemd/system/kubelet.service", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/kubelet.service", "size": 644, "state": "file", "uid": 0} | |
TASK [kubernetes/node : nginx-proxy | Write static pod] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.667) 0:02:29.180 ******* | |
TASK [kubernetes/node : nginx-proxy | Make nginx directory] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.059) 0:02:29.240 ******* | |
TASK [kubernetes/node : nginx-proxy | Write nginx-proxy configuration] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.054) 0:02:29.294 ******* | |
TASK [kubernetes/node : Make sure dynamic kubelet configuration directory is writeable] ****************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.054) 0:02:29.348 ******* | |
TASK [kubernetes/node : Write kubelet config file (kubeadm)] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:10 -0200 (0:00:00.047) 0:02:29.396 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "e3636281c3fa1cfa88a1bf04b15e5c63b6af3133", "dest": "/etc/kubernetes/kubelet.env", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubelet.env", "size": 1775, "state": "file", "uid": 0} | |
TASK [kubernetes/node : Ensure nodePort range is reserved] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.529) 0:02:29.925 ******* | |
ok: [monstrinho] => {"changed": false} | |
TASK [kubernetes/node : Verify if br_netfilter module exists] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.388) 0:02:30.313 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": "modinfo br_netfilter", "delta": "0:00:00.002164", "end": "2019-01-29 13:12:12.665070", "failed_when_result": false, "rc": 0, "start": "2019-01-29 13:12:12.662906", "stderr": "", "stderr_lines": [], "stdout": "filename: /lib/modules/4.15.0-44-generic/kernel/net/bridge/br_netfilter.ko\ndescription: Linux ethernet netfilter firewall bridge\nauthor: Bart De Schuymer <bdschuym@pandora.be>\nauthor: Lennert Buytenhek <buytenh@gnu.org>\nlicense: GPL\nsrcversion: 037C978AF8D3C061B00020A\ndepends: bridge\nretpoline: Y\nintree: Y\nname: br_netfilter\nvermagic: 4.15.0-44-generic SMP mod_unload \nsignat: PKCS#7\nsigner: \nsig_key: \nsig_hashalgo: md4", "stdout_lines": ["filename: /lib/modules/4.15.0-44-generic/kernel/net/bridge/br_netfilter.ko", "description: Linux ethernet netfilter firewall bridge", "author: Bart De Schuymer <bdschuym@pandora.be>", "author: Lennert Buytenhek <buytenh@gnu.org>", "license: GPL", "srcversion: 037C978AF8D3C061B00020A", "depends: bridge", "retpoline: Y", "intree: Y", "name: br_netfilter", "vermagic: 4.15.0-44-generic SMP mod_unload ", "signat: PKCS#7", "signer: ", "sig_key: ", "sig_hashalgo: md4"]} | |
TASK [kubernetes/node : Verify br_netfilter module path exists] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:11 -0200 (0:00:00.302) 0:02:30.615 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/modules-load.d", "size": 6, "state": "directory", "uid": 0} | |
TASK [kubernetes/node : Enable br_netfilter module] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:12 -0200 (0:00:00.266) 0:02:30.882 ******* | |
ok: [monstrinho] => {"changed": false, "name": "br_netfilter", "params": "", "state": "present"} | |
TASK [kubernetes/node : Persist br_netfilter module] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:12 -0200 (0:00:00.575) 0:02:31.457 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "c3394aff3e3a3e3920e68205b8e839b3d725648e", "dest": "/etc/modules-load.d/kubespray-br_netfilter.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kubespray-br_netfilter.conf", "size": 12, "state": "file", "uid": 0} | |
TASK [kubernetes/node : Check if bridge-nf-call-iptables key exists] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:13 -0200 (0:00:00.491) 0:02:31.949 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["sysctl", "net.bridge.bridge-nf-call-iptables"], "delta": "0:00:00.001698", "end": "2019-01-29 13:12:14.402135", "failed_when_result": false, "rc": 0, "start": "2019-01-29 13:12:14.400437", "stderr": "", "stderr_lines": [], "stdout": "net.bridge.bridge-nf-call-iptables = 1", "stdout_lines": ["net.bridge.bridge-nf-call-iptables = 1"]} | |
TASK [kubernetes/node : Enable bridge-nf-call tables] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:13 -0200 (0:00:00.376) 0:02:32.326 ******* | |
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-iptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-iptables"} | |
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-arptables) => {"changed": false, "item": "net.bridge.bridge-nf-call-arptables"} | |
ok: [monstrinho] => (item=net.bridge.bridge-nf-call-ip6tables) => {"changed": false, "item": "net.bridge.bridge-nf-call-ip6tables"} | |
TASK [kubernetes/node : Modprode Kernel Module for IPVS] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:14 -0200 (0:00:00.644) 0:02:32.970 ******* | |
ok: [monstrinho] => (item=ip_vs) => {"changed": false, "item": "ip_vs", "name": "ip_vs", "params": "", "state": "present"} | |
ok: [monstrinho] => (item=ip_vs_rr) => {"changed": false, "item": "ip_vs_rr", "name": "ip_vs_rr", "params": "", "state": "present"} | |
ok: [monstrinho] => (item=ip_vs_wrr) => {"changed": false, "item": "ip_vs_wrr", "name": "ip_vs_wrr", "params": "", "state": "present"} | |
ok: [monstrinho] => (item=ip_vs_sh) => {"changed": false, "item": "ip_vs_sh", "name": "ip_vs_sh", "params": "", "state": "present"} | |
TASK [kubernetes/node : Modprobe nf_conntrack_ipv4 for kernels < 4.19] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:14 -0200 (0:00:00.739) 0:02:33.709 ******* | |
ok: [monstrinho] => {"changed": false, "name": "nf_conntrack_ipv4", "params": "", "state": "present"} | |
TASK [kubernetes/node : Modprobe nf_conntrack for kernels >= 4.19] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.445) 0:02:34.155 ******* | |
TASK [kubernetes/node : Persist ip_vs modules] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.058) 0:02:34.213 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "fb666e350805b04493805c3b11187436eb0a0e31", "dest": "/etc/modules-load.d/kube_proxy-ipvs.conf", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/modules-load.d/kube_proxy-ipvs.conf", "size": 52, "state": "file", "uid": 0} | |
TASK [kubernetes/node : Purge proxy manifest for kubeadm or if proxy services being provided by other means, e.g. network_plugin] ************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:15 -0200 (0:00:00.613) 0:02:34.827 ******* | |
TASK [kubernetes/node : Cleanup kube-proxy leftovers from node] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:34.878 ******* | |
TASK [kubernetes/node : include_tasks] ******************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:34.928 ******* | |
TASK [kubernetes/node : Write cacert file] *************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.053) 0:02:34.981 ******* | |
TASK [kubernetes/node : Write cloud-config] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.051) 0:02:35.032 ******* | |
TASK [kubernetes/node : Enable kubelet] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:35.083 ******* | |
ok: [monstrinho] => {"changed": false, "enabled": true, "name": "kubelet", "state": "started", "status": {"ActiveEnterTimestamp": "Tue 2019-01-29 12:47:57 -02", "ActiveEnterTimestampMonotonic": "2961058314", "ActiveExitTimestamp": "Tue 2019-01-29 12:47:57 -02", "ActiveExitTimestampMonotonic": "2961005321", "ActiveState": "active", "After": "basic.target sysinit.target system.slice docker.service systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "", "AssertResult": "yes", "AssertTimestamp": "Tue 2019-01-29 12:47:57 -02", "AssertTimestampMonotonic": "2961053287", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend", "CollectMode": "inactive", "ConditionResult": "yes", "ConditionTimestamp": "Tue 2019-01-29 12:47:57 -02", "ConditionTimestampMonotonic": "2961053287", "ConfigurationDirectoryMode": "0755", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/kubelet.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "Kubernetes Kubelet Server", "DevicePolicy": "auto", "Documentation": "https://github.com/GoogleCloudPlatform/kubernetes", "DynamicUser": "no", "EnvironmentFile": "/etc/kubernetes/kubelet.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "7449", "ExecMainStartTimestamp": "Tue 2019-01-29 12:47:57 -02", "ExecMainStartTimestampMonotonic": "2961058254", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/kubelet ; argv[]=/usr/local/bin/kubelet $KUBE_LOGTOSTDERR $KUBE_LOG_LEVEL $KUBELET_API_SERVER $KUBELET_ADDRESS $KUBELET_PORT $KUBELET_HOSTNAME $KUBE_ALLOW_PRIV $KUBELET_ARGS $DOCKER_SOCKET $KUBELET_NETWORK_PLUGIN $KUBELET_VOLUME_PLUGIN $KUBELET_CLOUDPROVIDER ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/bin/mkdir ; argv[]=/bin/mkdir -p /var/lib/kubelet/volume-plugins ; ignore_errors=yes ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/kubelet.service", "GID": "0", "GuessMainPID": "yes", "IOAccounting": "no", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IPAccounting": "no", "IPEgressBytes": "18446744073709551615", "IPEgressPackets": "18446744073709551615", "IPIngressBytes": "18446744073709551615", "IPIngressPackets": "18446744073709551615", "Id": "kubelet.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Tue 2019-01-29 12:47:57 -02", "InactiveEnterTimestampMonotonic": "2961052299", "InactiveExitTimestamp": "Tue 2019-01-29 12:47:57 -02", "InactiveExitTimestampMonotonic": "2961054391", "InvocationID": "a3e803b52cc54047b011a8726dc60b77", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "0", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "16777216", "LimitMEMLOCKSoft": "16777216", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "30478", "LimitNPROCSoft": "30478", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "30478", "LimitSIGPENDINGSoft": "30478", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogsDirectoryMode": "0755", "MainPID": "7449", "MemoryAccounting": "no", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "MountFlags": "", "NFileDescriptorStore": "0", "NRestarts": "0", "Names": "kubelet.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "Perpetual": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "sysinit.target system.slice", "Restart": "always", "RestartUSec": "10s", "RestrictNamespaces": "no", "RestrictRealtime": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardInputData": "", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "Tue 2019-01-29 12:47:57 -02", "StateChangeTimestampMonotonic": "2961058314", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "24", "TasksMax": "4915", "TimeoutStartUSec": "1min 30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UID": "0", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Tue 2019-01-29 12:47:57 -02", "WatchdogTimestampMonotonic": "2961058312", "WatchdogUSec": "0"}} | |
PLAY [kube-master] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.424) 0:02:35.508 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:16 -0200 (0:00:00.050) 0:02:35.558 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.511) 0:02:36.070 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.530) 0:02:36.601 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:17 -0200 (0:00:00.050) 0:02:36.652 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/tokens : Check_tokens | check if the tokens have already been generated on first master] ************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.258) 0:02:36.910 ******* | |
TASK [kubernetes/tokens : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.048) 0:02:36.959 ******* | |
TASK [kubernetes/tokens : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.047) 0:02:37.006 ******* | |
TASK [kubernetes/tokens : Check tokens | check if a cert already exists] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.047) 0:02:37.054 ******* | |
TASK [kubernetes/tokens : Check_tokens | Set 'sync_tokens' to true] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.056) 0:02:37.110 ******* | |
TASK [kubernetes/tokens : Make sure the tokens directory exits] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.048) 0:02:37.158 ******* | |
TASK [kubernetes/tokens : Gen_tokens | copy tokens generation script] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.070) 0:02:37.229 ******* | |
TASK [kubernetes/tokens : Gen_tokens | generate tokens for master components] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.083) 0:02:37.312 ******* | |
TASK [kubernetes/tokens : Gen_tokens | generate tokens for node components] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.078) 0:02:37.391 ******* | |
TASK [kubernetes/tokens : Gen_tokens | Get list of tokens from first master] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.075) 0:02:37.467 ******* | |
TASK [kubernetes/tokens : Gen_tokens | Gather tokens] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.075) 0:02:37.542 ******* | |
TASK [kubernetes/tokens : Gen_tokens | Copy tokens on masters] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.054) 0:02:37.596 ******* | |
TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | see if old config exists] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:18 -0200 (0:00:00.073) 0:02:37.669 ******* | |
ok: [monstrinho -> None] => {"changed": false, "cmd": ["/usr/local/bin/etcdctl", "--peers=https://10.0.1.2:2379", "ls", "/registry/minions"], "delta": "0:00:00.023428", "end": "2019-01-29 13:12:20.196620", "failed_when_result": false, "msg": "non-zero return code", "rc": 4, "start": "2019-01-29 13:12:20.173192", "stderr": "Error: 100: Key not found (/registry) [14]", "stderr_lines": ["Error: 100: Key not found (/registry) [14]"], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/master : Pre-upgrade | etcd3 upgrade | use etcd2 unless forced to etcd3] **************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.448) 0:02:38.118 ******* | |
TASK [kubernetes/master : Pre-upgrade | Delete master manifests] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.052) 0:02:38.170 ******* | |
TASK [kubernetes/master : Pre-upgrade | Delete master containers forcefully] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.071) 0:02:38.242 ******* | |
TASK [kubernetes/master : Make sure the users directory exits] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.070) 0:02:38.313 ******* | |
TASK [kubernetes/master : Populate users for basic auth in API] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.049) 0:02:38.362 ******* | |
TASK [kubernetes/master : Create webhook token auth config] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.061) 0:02:38.424 ******* | |
TASK [kubernetes/master : Write secrets for encrypting secret data at rest] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.239) 0:02:38.663 ******* | |
TASK [kubernetes/master : Install | Copy kubectl binary from download dir] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:19 -0200 (0:00:00.075) 0:02:38.739 ******* | |
ok: [monstrinho -> None] => {"changed": false, "cmd": "/usr/bin/rsync --delay-updates -F --archive --no-owner --no-group --out-format=<<CHANGED>>%i %n%L /tmp/releases/hyperkube /usr/local/bin/kubectl", "msg": "", "rc": 0, "stdout_lines": []} | |
TASK [kubernetes/master : install | Set kubectl binary permissions] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:20 -0200 (0:00:00.255) 0:02:38.994 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/kubectl", "size": 177749912, "state": "file", "uid": 0} | |
TASK [kubernetes/master : Install kubectl bash completion] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:20 -0200 (0:00:00.550) 0:02:39.544 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl completion bash >/etc/bash_completion.d/kubectl.sh", "delta": "0:00:00.106103", "end": "2019-01-29 13:12:22.098300", "rc": 0, "start": "2019-01-29 13:12:21.992197", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/master : Set kubectl bash completion file] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.522) 0:02:40.067 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/bash_completion.d/kubectl.sh", "size": 375407, "state": "file", "uid": 0} | |
TASK [kubernetes/master : Disable SecurityContextDeny admission-controller and enable PodSecurityPolicy] ************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.357) 0:02:40.424 ******* | |
TASK [kubernetes/master : kubeadm | Check if old apiserver cert exists on host] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:21 -0200 (0:00:00.072) 0:02:40.496 ******* | |
ok: [monstrinho -> None] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/master : Copy old certs to the kubeadm expected path] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.427) 0:02:40.924 ******* | |
TASK [kubernetes/master : kubeadm | Check apiserver key] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.178) 0:02:41.102 ******* | |
ok: [monstrinho -> None] => {"changed": false, "stat": {"atime": 1548773262.5620532, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "e92e08712e712d799d59ccc1939971da80eca3c1", "ctime": 1548773238.8861935, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201896, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548773238.8861935, "nlink": 1, "path": "/etc/kubernetes/ssl/apiserver.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/master : kubeadm | Check if kubeadm has already run] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:22 -0200 (0:00:00.417) 0:02:41.520 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548773238.0061986, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "066396b240069501e5c138604634e46cb93f40fa", "ctime": 1548773238.0061986, "dev": 69, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 132, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1548773238.0061986, "nlink": 1, "path": "/var/lib/kubelet/config.yaml", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1745, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/master : kubeadm | Delete old admin.conf] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.485) 0:02:42.005 ******* | |
TASK [kubernetes/master : kubeadm | Delete old static pods] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.052) 0:02:42.058 ******* | |
TASK [kubernetes/master : kubeadm | Forcefully delete old static pods] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.075) 0:02:42.134 ******* | |
TASK [kubernetes/master : kubeadm | aggregate all SANs] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.070) 0:02:42.204 ******* | |
ok: [monstrinho] => {"ansible_facts": {"apiserver_sans": "kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local 10.233.0.1 localhost 127.0.0.1 monstrinho 10.0.1.2"}, "changed": false} | |
TASK [kubernetes/master : kubeadm | Copy etcd cert dir under k8s cert dir] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.213) 0:02:42.418 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["cp", "-TR", "/etc/ssl/etcd/ssl", "/etc/kubernetes/ssl/etcd"], "delta": "0:00:00.002671", "end": "2019-01-29 13:12:24.858496", "rc": 0, "start": "2019-01-29 13:12:24.855825", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/master : Create audit-policy directory] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.352) 0:02:42.770 ******* | |
TASK [kubernetes/master : Write api audit policy yaml] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:23 -0200 (0:00:00.062) 0:02:42.833 ******* | |
TASK [kubernetes/master : set kubeadm_config_api_fqdn define] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.052) 0:02:42.886 ******* | |
TASK [kubernetes/master : gets the kubeadm version] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.058) 0:02:42.944 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "version", "-o", "short"], "delta": "0:00:00.014567", "end": "2019-01-29 13:12:25.282836", "rc": 0, "start": "2019-01-29 13:12:25.268269", "stderr": "", "stderr_lines": [], "stdout": "v1.13.2", "stdout_lines": ["v1.13.2"]} | |
TASK [kubernetes/master : sets kubeadm api version to v1alpha1] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.259) 0:02:43.204 ******* | |
TASK [kubernetes/master : sets kubeadm api version to v1alpha2] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.054) 0:02:43.258 ******* | |
TASK [kubernetes/master : sets kubeadm api version to v1alpha3] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.053) 0:02:43.312 ******* | |
TASK [kubernetes/master : sets kubeadm api version to v1beta1] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.053) 0:02:43.366 ******* | |
ok: [monstrinho] => {"ansible_facts": {"kubeadmConfig_api_version": "v1beta1"}, "changed": false} | |
TASK [kubernetes/master : kubeadm | Create kubeadm config] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:24 -0200 (0:00:00.136) 0:02:43.503 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "8e326d926add2e223648a5366b902c63bf15b8e7", "dest": "/etc/kubernetes/kubeadm-config.yaml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/kubeadm-config.yaml", "size": 2417, "state": "file", "uid": 0} | |
TASK [kubernetes/master : Backup old certs and keys] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:25 -0200 (0:00:00.641) 0:02:44.144 ******* | |
changed: [monstrinho] => (item={u'dest': u'apiserver.crt.old', u'src': u'apiserver.crt'}) => {"changed": true, "checksum": "0c928abf271696be5deeea7b94f14cae84de4a12", "dest": "/etc/kubernetes/ssl/apiserver.crt.old", "gid": 0, "group": "root", "item": {"dest": "apiserver.crt.old", "src": "apiserver.crt"}, "md5sum": "811b07032d0a11bbd49135180ac1ed19", "mode": "0644", "owner": "root", "size": 1424, "src": "/etc/kubernetes/ssl/apiserver.crt", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'apiserver.key.old', u'src': u'apiserver.key'}) => {"changed": true, "checksum": "e92e08712e712d799d59ccc1939971da80eca3c1", "dest": "/etc/kubernetes/ssl/apiserver.key.old", "gid": 0, "group": "root", "item": {"dest": "apiserver.key.old", "src": "apiserver.key"}, "md5sum": "5188f29e5ef544743ee25f085864a351", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/apiserver.key", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'apiserver-kubelet-client.crt.old', u'src': u'apiserver-kubelet-client.crt'}) => {"changed": true, "checksum": "7b21c18c2a70ce35b6d8c885381dc905e0e20f7f", "dest": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt.old", "gid": 0, "group": "root", "item": {"dest": "apiserver-kubelet-client.crt.old", "src": "apiserver-kubelet-client.crt"}, "md5sum": "da5cf07280793d8dd24a7fc21bfdf1fd", "mode": "0644", "owner": "root", "size": 1099, "src": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'apiserver-kubelet-client.key.old', u'src': u'apiserver-kubelet-client.key'}) => {"changed": true, "checksum": "0ce6a50f6f8ba65c5ca80bd2f2071aaa3f4946bd", "dest": "/etc/kubernetes/ssl/apiserver-kubelet-client.key.old", "gid": 0, "group": "root", "item": {"dest": "apiserver-kubelet-client.key.old", "src": "apiserver-kubelet-client.key"}, "md5sum": "c2192e0565eda67f5657989ea1fd4bf5", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'front-proxy-client.crt.old', u'src': u'front-proxy-client.crt'}) => {"changed": true, "checksum": "6828baee5b815b064bcb9c577d89394e85bed8b9", "dest": "/etc/kubernetes/ssl/front-proxy-client.crt.old", "gid": 0, "group": "root", "item": {"dest": "front-proxy-client.crt.old", "src": "front-proxy-client.crt"}, "md5sum": "c552d0fe86eb8776e507467fe8b530dd", "mode": "0644", "owner": "root", "size": 1058, "src": "/etc/kubernetes/ssl/front-proxy-client.crt", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'front-proxy-client.key.old', u'src': u'front-proxy-client.key'}) => {"changed": true, "checksum": "faf4d7a989b9beeb2b3fbc03ad759b82b608e1cd", "dest": "/etc/kubernetes/ssl/front-proxy-client.key.old", "gid": 0, "group": "root", "item": {"dest": "front-proxy-client.key.old", "src": "front-proxy-client.key"}, "md5sum": "1736be3ddb07f1ab023c6d587a52e2e6", "mode": "0644", "owner": "root", "size": 1675, "src": "/etc/kubernetes/ssl/front-proxy-client.key", "state": "file", "uid": 0} | |
TASK [kubernetes/master : Remove old certs and keys] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:26 -0200 (0:00:01.448) 0:02:45.592 ******* | |
changed: [monstrinho] => (item=apiserver.crt) => {"changed": true, "item": "apiserver.crt", "path": "/etc/kubernetes/ssl/apiserver.crt", "state": "absent"} | |
changed: [monstrinho] => (item=apiserver.key) => {"changed": true, "item": "apiserver.key", "path": "/etc/kubernetes/ssl/apiserver.key", "state": "absent"} | |
changed: [monstrinho] => (item=apiserver-kubelet-client.crt) => {"changed": true, "item": "apiserver-kubelet-client.crt", "path": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "state": "absent"} | |
changed: [monstrinho] => (item=apiserver-kubelet-client.key) => {"changed": true, "item": "apiserver-kubelet-client.key", "path": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "state": "absent"} | |
changed: [monstrinho] => (item=front-proxy-client.crt) => {"changed": true, "item": "front-proxy-client.crt", "path": "/etc/kubernetes/ssl/front-proxy-client.crt", "state": "absent"} | |
changed: [monstrinho] => (item=front-proxy-client.key) => {"changed": true, "item": "front-proxy-client.key", "path": "/etc/kubernetes/ssl/front-proxy-client.key", "state": "absent"} | |
TASK [kubernetes/master : Generate new certs and keys] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:27 -0200 (0:00:00.943) 0:02:46.536 ******* | |
changed: [monstrinho] => (item=apiserver) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "apiserver", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.256491", "end": "2019-01-29 13:12:29.132740", "item": "apiserver", "rc": 0, "start": "2019-01-29 13:12:28.876249", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"apiserver\" certificate and key\n[certs] apiserver serving cert is signed for DNS names [monstrinho kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local localhost monstrinho] and IPs [10.233.0.1 10.0.1.2 10.0.1.2 10.233.0.1 127.0.0.1 10.0.1.2]", "stdout_lines": ["[certs] Generating \"apiserver\" certificate and key", "[certs] apiserver serving cert is signed for DNS names [monstrinho kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local localhost monstrinho] and IPs [10.233.0.1 10.0.1.2 10.0.1.2 10.233.0.1 127.0.0.1 10.0.1.2]"]} | |
changed: [monstrinho] => (item=apiserver-kubelet-client) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "apiserver-kubelet-client", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.235532", "end": "2019-01-29 13:12:29.516183", "item": "apiserver-kubelet-client", "rc": 0, "start": "2019-01-29 13:12:29.280651", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"apiserver-kubelet-client\" certificate and key", "stdout_lines": ["[certs] Generating \"apiserver-kubelet-client\" certificate and key"]} | |
changed: [monstrinho] => (item=front-proxy-client) => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "certs", "front-proxy-client", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:00.207188", "end": "2019-01-29 13:12:29.838709", "item": "front-proxy-client", "rc": 0, "start": "2019-01-29 13:12:29.631521", "stderr": "", "stderr_lines": [], "stdout": "[certs] Generating \"front-proxy-client\" certificate and key", "stdout_lines": ["[certs] Generating \"front-proxy-client\" certificate and key"]} | |
TASK [kubernetes/master : Generate new certs and keys] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:28 -0200 (0:00:01.226) 0:02:47.763 ******* | |
TASK [kubernetes/master : kubeadm | Initialize first master] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:28 -0200 (0:00:00.101) 0:02:47.865 ******* | |
TASK [kubernetes/master : slurp kubeadm certs] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:29 -0200 (0:00:00.089) 0:02:47.954 ******* | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver.crt", "source": "/etc/kubernetes/ssl/apiserver.crt"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver.key", "source": "/etc/kubernetes/ssl/apiserver.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver-kubelet-client.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt", "source": "/etc/kubernetes/ssl/apiserver-kubelet-client.crt"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/apiserver-kubelet-client.key) => {"changed": false, "content": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcEFJQkFBS0NBUUVBM1Q1VjJEK21TSklZbmpVTTlqQzVCdG05K0dOUnZ0S0RiVzl4Smt3cFVGUUxRYnkwCmRVQTU0QzE4SkRqaEdISjZqWDl1Yy82Ulh6ZFR4REUxWkpCWGdmWWJSYjdMOG91VnpiRmpwZHprVG9iYW1yVjcKVDFQTE5QMWRxRjNXbW0xRVIwNEFYaWZBWFJqV2hpTWdZRll4OHczUk5ZTXpJTkh3QUVnUk4yTUE0aUFxY1VUZQpLU2pJTnhucFl6eS9NWDFWTkdDdk45WDgvSjd2d2ZSNXpFMlFjL0NSTDhTM0w4TklLKzdXQ1ZrckVINm1ZZ0dTCkt5M2NDWUo5MEVxaGc4ZEY2UnNiU2c1USt6NXNUNHl4ZkFaTWlwVzJ6MnBDaTF4Nnd0bStmeE9STENjMXkrd3UKOFF0SGZ2bXVMR244eVR1WnZleklnSC9HQ1RmaysyVGJMNE1VWlFJREFRQUJBb0lCQUJDd3N5a3RKQTQxZDBYNApHcEkzK3IxWmo4czlNdDJDWkFmTmNHdkRNeHFzUEcwcEh6UDVOR1NGQ2VoeG9nbUdHVml6VkZITDBvdXNVTlZzCklPc0ZPSlRGVENsbXkxdnd5OHhJcFl2TnJpdCtZTjlxOFhKNmo4bmZrMEV3VXhBelRnTlREeFFMUzZlNlIvUzIKa2FxeTFmSFFDUWhRYlhyOFcyNnFBU0o4aFlTSlpMOXlzcjY4RlRSbFdMbUQ1Zndkb2JXZGRWd3IwSjhnSnB1MwovL3h1cGpwMTYxdWZsT2h2U3l4aHhCbVlQa2h3bmZWRE9TbVQzek9zQi94OGwxMGNncEdIZlU0cGdtNUJsM2lKCnBPMng0UEl4Z1dWeGZwZjR4blFOb21mYVpnL3hOT0QrbXlvZ0I4bmZZeC9sbER5RHRpU3I3a2syaHp2MU1aRDQKaHBHS2NnRUNnWUVBNkhYOTRqWVhaNDVtNDBOZUFUczU4ai9MNUc0QVRKeXhjQ0xtOE1qZEVja2UzS3JWUFUxVgp2VjZQQVNQbzEya3g3aFU0Y0FsV2FNQXVMM29CdGEyY0FId2R4RFBkZUNucHhJZWY0dms0ZmNRSk9UODhRM1NsClUwNjZUdTZrMHJURkFGYkZmaHRTYUNBZWVHRmlHUXZHdTkwYVVMT2pHWFJEaStaWExWdVNFNDBDZ1lFQTg2V08KOHNNVHFMWThzMVhsWlZCaFV3dlNYQm9pNTFENW9QbHQzSFhYRnFLNzNRanM5cEhaRHNFYkN2elRWaHFENVkvVQowRWRHMXlSTGF1U0wxQ01FV1drbnB5Z1FnV3pnWHkzRks3L0NSNFhNN1F4TlJRVHZrbjNhVm16NU5UdGJWTk5xCjB5M0tLK2dESWZKWTNkVVNJOTFtbk5EQlQ2blo5d0NsdW8vMElqa0NnWUJNRmtyS1h5QWNBaTFGRjhqT0tGK1kKSGkrVGpqbkUyY2p1Ums1RzQ4Z1FTVDh6eFNyVXpOcFNpSC9RUkx1eXZqamNqOCtRUkU0bkxUZ3d6QU9CUHRrQQpBNkFPbDFkWFBJaktqZ1hVV2ZTV25iTFRMUktCbGMyRFRoS0hRVzlybEVXakRjUEl1aEtvQ0ZOUTNiY3BNWVNUCit4UGc5RnRmT29IZGFjQ0JGU2JrQlFLQmdRRENUakVmSnpYQllYd3RKUDVwZXQzeTVjV2dUL092OStMc1hwOGYKcHhhZVphOWVpaVM0U3Y0SWh6WHk0RWdHTGVVc0tUVjEyTElGRjF2UjVtd2hCTUFPTWc4K2ZuUVRVMm5vWGM4VgpvYnJsWVM1WmlXc0I5UHErSUFJRTFLazFxNTJkbTNGZzh1NTliMjA0SUZhQXF0RHBxMEtQSXVoWGlNUmIrTGN5CmZtVWErUUtCZ1FEbGhpa3hidGpTR09ua1hWVjJqWW8rYUFmcm9CS09nOE05ZW5aaDE5ZFBrU2lmWjFDM0RyTE0KMUQ3andoTzlMcU1WU1FjM1hwN3lYLzE3S29pRmdIVlNkb1huNVVvZkZrRWJvZnZLeGFSU2VYMXBTbWc5YU9CRAptb0lwaU91dG50TlhxVVkyd2ZiUmtmOXFHaFEzc3c3SlBud3lSay9zcERxVm1OVFdDSkgyUFE9PQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/apiserver-kubelet-client.key", "source": "/etc/kubernetes/ssl/apiserver-kubelet-client.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/ca.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.crt", "source": "/etc/kubernetes/ssl/ca.crt"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/ca.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/ca.key", "source": "/etc/kubernetes/ssl/ca.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-ca.crt) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-ca.crt", "source": "/etc/kubernetes/ssl/front-proxy-ca.crt"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-ca.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-ca.key", "source": "/etc/kubernetes/ssl/front-proxy-ca.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-client.crt) => {"changed": false, "content": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMzekNDQWNlZ0F3SUJBZ0lJUDU2aTd1cHJlQXd3RFFZSktvWklodmNOQVFFTEJRQXdHVEVYTUJVR0ExVUUKQXhNT1puSnZiblF0Y0hKdmVIa3RZMkV3SGhjTk1Ua3dNVEk1TVRRME56RTRXaGNOTWpBd01USTVNVFV4TWpJNQpXakFkTVJzd0dRWURWUVFERXhKbWNtOXVkQzF3Y205NGVTMWpiR2xsYm5Rd2dnRWlNQTBHQ1NxR1NJYjNEUUVCCkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEWlhVR3pYT1Rqa203M1pMdmFBNUlRY0NpeGU0U0tYU21DZnJ1Mkc5OVEKbmtYcGlMY0pZZVZzbk1xZzVxdGIvcnFXMTFzdDRJK2luUmJQYm9RdjY5VUJkbXZOb3lXczFVc2RRV2JoV3pqNgo5bUExci9QMzQyemJxU2dvMHMycTU3QTJ0eUJvdUNaRW1xb1RYL1FjSzBpTGc1TFFUR2NNZWc0eWVJb29uaklHCkpyTHp0UVAzamdlUDAwN1RheVpQNEYvN2d0YS9aaVp6ZSsvYjgzbm80NGJ3UjZkRkF4ckZvNHRmM1VxaExBL0YKVDlJUkxmZ2pZMmZJOTFFaUczQjRDTGJHZ0ZnUE5ycFJCakFjR2FPV1hwK21QeThQdWlaQlpPQkdrZDZZZDhUcgpVdFVaWGxUVTFNKzgyOWpaTTcya0Rqc0JIK09reEZLbUhoQkxoYjQyVERYbEFnTUJBQUdqSnpBbE1BNEdBMVVkCkR3RUIvd1FFQXdJRm9EQVRCZ05WSFNVRUREQUtCZ2dyQmdFRkJRY0RBakFOQmdrcWhraUc5dzBCQVFzRkFBT0MKQVFFQVpPWTRmMkFRb294bWp2UUg2NlNlM3g5Q2NKdWlGbGtEOGFqUHVCRW1IdXk0MEk2TWxzREZRNUltSDdteQprcXhoblViRk5tSHpYdmo5K0RzMmFmTHpYWFU2Qisra0srU3VieDBDZUFOb3Rkbmo5RmpFYmxIdE42KzU4ZGNMCjAreldoZExJZ3dmVC9JQUZKdVdlRVpNRm1qY2RVVDYrUmx1S3FEaWpRNUFSSkNRTGI1UWN3U3dkUm9hUEVpSkYKMFdBSkp5UThhcFE0SFlmOHdEbW5wR3d5aUJFalVRMVRWQUU1eDUwNndMaUl1MGswZTU3U01VbmlRby9HMklUUApiMlJYN290UXVJQisxR2FienM3S0lpblB4VU1BQWNuNGJ0NmRFL2NEakZnSXlqMjB0bFFlNmxHRmZhWDc4b3RlCk8rc2dSUWFDSGVsUEJjSzdoMVo3Y293K093PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-client.crt", "source": "/etc/kubernetes/ssl/front-proxy-client.crt"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/front-proxy-client.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/front-proxy-client.key", "source": "/etc/kubernetes/ssl/front-proxy-client.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/sa.key) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/sa.key", "source": "/etc/kubernetes/ssl/sa.key"} | |
ok: [monstrinho -> None] => (item=/etc/kubernetes/ssl/sa.pub) => {"changed": false, "content": "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", "encoding": "base64", "item": "/etc/kubernetes/ssl/sa.pub", "source": "/etc/kubernetes/ssl/sa.pub"} | |
TASK [kubernetes/master : kubeadm | write out kubeadm certs] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:30 -0200 (0:00:01.481) 0:02:49.436 ******* | |
TASK [kubernetes/master : Backup old configuration files] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:30 -0200 (0:00:00.163) 0:02:49.599 ******* | |
changed: [monstrinho] => (item={u'dest': u'admin.conf.old', u'src': u'admin.conf'}) => {"changed": true, "checksum": "2d3c94f30ca053ebaf2a823eadf895d419d65628", "dest": "/etc/kubernetes/admin.conf.old", "gid": 0, "group": "root", "item": {"dest": "admin.conf.old", "src": "admin.conf"}, "md5sum": "029d302d886f105ac69a1ba5711dd263", "mode": "0644", "owner": "root", "size": 5460, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'kubelet.conf.old', u'src': u'kubelet.conf'}) => {"changed": true, "checksum": "49d608ec5b98ed6550835bc35779ac2a1e33812a", "dest": "/etc/kubernetes/kubelet.conf.old", "gid": 0, "group": "root", "item": {"dest": "kubelet.conf.old", "src": "kubelet.conf"}, "md5sum": "8d950a419eb738459f12d5dd6da27012", "mode": "0644", "owner": "root", "size": 5488, "src": "/etc/kubernetes/kubelet.conf", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'controller-manager.conf.old', u'src': u'controller-manager.conf'}) => {"changed": true, "checksum": "c0807eced929128db23ef3e66cb22550cb368e7a", "dest": "/etc/kubernetes/controller-manager.conf.old", "gid": 0, "group": "root", "item": {"dest": "controller-manager.conf.old", "src": "controller-manager.conf"}, "md5sum": "239f7e95cb96f1bbb1e27253220c49ac", "mode": "0644", "owner": "root", "size": 5492, "src": "/etc/kubernetes/controller-manager.conf", "state": "file", "uid": 0} | |
changed: [monstrinho] => (item={u'dest': u'scheduler.conf.old', u'src': u'scheduler.conf'}) => {"changed": true, "checksum": "73b0ba1d3a598bd469626ba545632fd0a54ca403", "dest": "/etc/kubernetes/scheduler.conf.old", "gid": 0, "group": "root", "item": {"dest": "scheduler.conf.old", "src": "scheduler.conf"}, "md5sum": "93ec8657c209af6ce83ece933f6b7921", "mode": "0644", "owner": "root", "size": 5440, "src": "/etc/kubernetes/scheduler.conf", "state": "file", "uid": 0} | |
TASK [kubernetes/master : Remove old configuration files] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:31 -0200 (0:00:00.948) 0:02:50.547 ******* | |
changed: [monstrinho] => (item=admin.conf) => {"changed": true, "item": "admin.conf", "path": "/etc/kubernetes/admin.conf", "state": "absent"} | |
changed: [monstrinho] => (item=kubelet.conf) => {"changed": true, "item": "kubelet.conf", "path": "/etc/kubernetes/kubelet.conf", "state": "absent"} | |
changed: [monstrinho] => (item=controller-manager.conf) => {"changed": true, "item": "controller-manager.conf", "path": "/etc/kubernetes/controller-manager.conf", "state": "absent"} | |
changed: [monstrinho] => (item=scheduler.conf) => {"changed": true, "item": "scheduler.conf", "path": "/etc/kubernetes/scheduler.conf", "state": "absent"} | |
TASK [kubernetes/master : Generate new configuration files] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:32 -0200 (0:00:00.689) 0:02:51.237 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "init", "phase", "kubeconfig", "all", "--config=/etc/kubernetes/kubeadm-config.yaml"], "delta": "0:00:01.092394", "end": "2019-01-29 13:12:34.670344", "rc": 0, "start": "2019-01-29 13:12:33.577950", "stderr": "", "stderr_lines": [], "stdout": "[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n[kubeconfig] Writing \"admin.conf\" kubeconfig file\n[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n[kubeconfig] Writing \"scheduler.conf\" kubeconfig file", "stdout_lines": ["[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"", "[kubeconfig] Writing \"admin.conf\" kubeconfig file", "[kubeconfig] Writing \"kubelet.conf\" kubeconfig file", "[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file", "[kubeconfig] Writing \"scheduler.conf\" kubeconfig file"]} | |
TASK [kubernetes/master : Generate new configuration files] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:33 -0200 (0:00:01.355) 0:02:52.593 ******* | |
TASK [kubernetes/master : kubeadm | Init other uninitialized masters] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.059) 0:02:52.652 ******* | |
TASK [kubernetes/master : kubeadm | Upgrade first master] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.056) 0:02:52.709 ******* | |
TASK [kubernetes/master : kubeadm | Upgrade other masters] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.051) 0:02:52.760 ******* | |
TASK [kubernetes/master : kubeadm | Check apiserver key again] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:33 -0200 (0:00:00.072) 0:02:52.832 ******* | |
ok: [monstrinho -> None] => {"changed": false, "stat": {"atime": 1548774750.34112, "attr_flags": "", "attributes": [], "block_size": 2048, "blocks": 9, "charset": "us-ascii", "checksum": "690e8cd1da47040ddef09e31f572b21bcf2d7211", "ctime": 1548774749.125083, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201924, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548774749.125083, "nlink": 1, "path": "/etc/kubernetes/ssl/apiserver.key", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/master : kubeadm | Set secret_changed if service account key was updated] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:34 -0200 (0:00:00.502) 0:02:53.335 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.002183", "end": "2019-01-29 13:12:35.945578", "rc": 0, "start": "2019-01-29 13:12:35.943395", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/master : kubeadm | Retrieve files to purge] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.629) 0:02:53.965 ******* | |
TASK [kubernetes/master : kubeadm | Purge old certs] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.052) 0:02:54.018 ******* | |
TASK [kubernetes/master : kubeadm | Purge old kubeconfig] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.060) 0:02:54.078 ******* | |
TASK [kubernetes/master : kubeadm | Remove taint for master with node role] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:35 -0200 (0:00:00.083) 0:02:54.162 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": ["/usr/local/bin/kubectl", "--kubeconfig", "/etc/kubernetes/admin.conf", "taint", "node", "monstrinho", "node-role.kubernetes.io/master:NoSchedule-"], "delta": "0:00:01.995821", "end": "2019-01-29 13:12:38.808502", "failed_when_result": false, "msg": "non-zero return code", "rc": 1, "start": "2019-01-29 13:12:36.812681", "stderr": "error: taint \"node-role.kubernetes.io/master:NoSchedule\" not found", "stderr_lines": ["error: taint \"node-role.kubernetes.io/master:NoSchedule\" not found"], "stdout": "", "stdout_lines": []} | |
TASK [kubernetes/client : Set external kube-apiserver endpoint] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:37 -0200 (0:00:02.572) 0:02:56.735 ******* | |
ok: [monstrinho] => {"ansible_facts": {"external_apiserver_address": "10.0.1.2", "external_apiserver_port": "6443"}, "changed": false} | |
TASK [kubernetes/client : Create kube config dir] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.142) 0:02:56.877 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/root/.kube", "size": 10, "state": "directory", "uid": 0} | |
TASK [kubernetes/client : Copy admin kubeconfig to root user home] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.354) 0:02:57.231 ******* | |
changed: [monstrinho] => {"backup_file": "/root/.kube/config.25845.2019-01-29@13:12:39~", "changed": true, "checksum": "c3c978ca3d58bb2392a40095913bed66ff19d9d9", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "e3befcbe27acd95aa7f633f45c2118bb", "mode": "0600", "owner": "root", "size": 5456, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0} | |
TASK [kubernetes/client : Generate admin kubeconfig with external api endpoint] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:38 -0200 (0:00:00.340) 0:02:57.571 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubeadm alpha kubeconfig user --client-name kubernetes-admin --org system:masters --cert-dir /etc/kubernetes/ssl --apiserver-advertise-address 10.0.1.2 --apiserver-bind-port 6443", "delta": "0:00:01.654824", "end": "2019-01-29 13:12:41.562743", "rc": 0, "start": "2019-01-29 13:12:39.907919", "stderr": "", "stderr_lines": [], "stdout": "apiVersion: v1\nclusters:\n- cluster:\n certificate-authority-data: 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\n server: https://10.0.1.2:6443\n name: kubernetes\ncontexts:\n- context:\n cluster: kubernetes\n user: kubernetes-admin\n name: kubernetes-admin@kubernetes\ncurrent-context: kubernetes-admin@kubernetes\nkind: Config\npreferences: {}\nusers:\n- name: kubernetes-admin\n user:\n client-certificate-data: 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\n client-key-data: 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", "stdout_lines": ["apiVersion: v1", "clusters:", "- cluster:", " certificate-authority-data: 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", " server: https://10.0.1.2:6443", " name: kubernetes", "contexts:", "- context:", " cluster: kubernetes", " user: kubernetes-admin", " name: kubernetes-admin@kubernetes", "current-context: kubernetes-admin@kubernetes", "kind: Config", "preferences: {}", "users:", "- name: kubernetes-admin", " user:", " client-certificate-data: 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", " client-key-data: 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"]} | |
TASK [kubernetes/client : Write admin kubeconfig on ansible host] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:40 -0200 (0:00:01.945) 0:02:59.517 ******* | |
changed: [monstrinho -> localhost] => {"changed": true, "checksum": "a05332297ee83d91c20e8ae6232bb880f676459d", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/admin.conf", "gid": 20, "group": "staff", "md5sum": "7974acce2edb87714ee50a4e6e2df437", "mode": "0640", "owner": "yan", "size": 5443, "src": "/Users/yan/.ansible/tmp/ansible-tmp-1548774760.7-168106249943215/source", "state": "file", "uid": 501} | |
TASK [kubernetes/client : Copy kubectl binary to ansible host] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:41 -0200 (0:00:00.390) 0:02:59.907 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "590344a1611ce0bbdad10bae4ec153693ca64ca2", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl", "file": "/usr/local/bin/kubectl", "md5sum": "c5e3602113c04dfb02232e182a37c99e"} | |
TASK [kubernetes/client : create helper script kubectl.sh on ansible host] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:42 -0200 (0:00:01.231) 0:03:01.138 ******* | |
ok: [monstrinho -> localhost] => {"changed": false, "checksum": "0caf2b6af2083cd87af928e52cf23916a30bb09c", "dest": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl.sh", "gid": 20, "group": "staff", "mode": "0755", "owner": "yan", "path": "/Users/yan/Documents/Projects/monstrinho/kubespray/inventory/yetanothernerd/artifacts/kubectl.sh", "size": 65, "state": "file", "uid": 501} | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Wait for kube-apiserver] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:42 -0200 (0:00:00.370) 0:03:01.509 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:12:44 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Check AppArmor status] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.763) 0:03:02.272 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Set apparmor_enabled] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.051) 0:03:02.324 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Render templates for PodSecurityPolicy] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.054) 0:03:02.379 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add policies, roles, bindings for PodSecurityPolicy] ********************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.070) 0:03:02.450 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding to admit nodes] *********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:43 -0200 (0:00:00.082) 0:03:02.533 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "7a5d333673421310e034bd1931c65d490d541632", "dest": "/etc/kubernetes/node-crb.yml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/node-crb.yml", "size": 408, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/cluster_roles : Apply workaround to allow all nodes with cert O=system:nodes to register] ****************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.464) 0:03:02.997 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add webhook ClusterRole that grants access to proxy, stats, log, spec, and metrics on a kubelet] ************************************************************************************* | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.060) 0:03:03.058 ******* | |
TASK [kubernetes-apps/cluster_roles : Apply webhook ClusterRole] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.055) 0:03:03.113 ******* | |
TASK [kubernetes-apps/cluster_roles : Kubernetes Apps | Add ClusterRoleBinding for system:nodes to webhook ClusterRole] ********************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.054) 0:03:03.167 ******* | |
TASK [kubernetes-apps/cluster_roles : Grant system:nodes the webhook ClusterRole] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.224 ******* | |
TASK [kubernetes-apps/cluster_roles : Check if vsphere-cloud-provider ClusterRole exists] **************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.052) 0:03:03.276 ******* | |
TASK [kubernetes-apps/cluster_roles : Write vsphere-cloud-provider ClusterRole manifest] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.333 ******* | |
TASK [kubernetes-apps/cluster_roles : Apply vsphere-cloud-provider ClusterRole] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.055) 0:03:03.388 ******* | |
TASK [kubernetes-apps/cluster_roles : include_tasks] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.056) 0:03:03.444 ******* | |
TASK [kubernetes-apps/cluster_roles : PriorityClass | Copy k8s-cluster-critical-pc.yml file] ************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:44 -0200 (0:00:00.062) 0:03:03.507 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "2abb3233dd0241e931c969f251bdcd54183b1f88", "dest": "/etc/kubernetes/k8s-cluster-critical-pc.yml", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/k8s-cluster-critical-pc.yml", "size": 235, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/cluster_roles : PriorityClass | Create k8s-cluster-critical] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:45 -0200 (0:00:00.459) 0:03:03.966 ******* | |
ok: [monstrinho] => {"changed": false, "msg": "success: priorityclass.scheduling.k8s.io/k8s-cluster-critical configured"} | |
RUNNING HANDLER [kubernetes/master : Master | set secret_changed] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:46 -0200 (0:00:01.001) 0:03:04.968 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/bin/true"], "delta": "0:00:00.001421", "end": "2019-01-29 13:12:47.337078", "rc": 0, "start": "2019-01-29 13:12:47.335657", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
RUNNING HANDLER [kubernetes/master : Master | set secret_changed to true] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.320) 0:03:05.289 ******* | |
ok: [monstrinho] => {"ansible_facts": {"secret_changed": true}, "changed": false} | |
RUNNING HANDLER [kubernetes/master : Master | Copy new kubeconfig for root user] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.126) 0:03:05.415 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "c3c978ca3d58bb2392a40095913bed66ff19d9d9", "dest": "/root/.kube/config", "gid": 0, "group": "root", "md5sum": "e3befcbe27acd95aa7f633f45c2118bb", "mode": "0600", "owner": "root", "size": 5456, "src": "/etc/kubernetes/admin.conf", "state": "file", "uid": 0} | |
PLAY [k8s-cluster] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.361) 0:03:05.777 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:46 -0200 (0:00:00.053) 0:03:05.831 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:47 -0200 (0:00:00.529) 0:03:06.360 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.528) 0:03:06.889 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.054) 0:03:06.943 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/kubeadm : Set kubeadm_discovery_address] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.129) 0:03:07.072 ******* | |
ok: [monstrinho] => {"ansible_facts": {"kubeadm_discovery_address": "10.0.1.2:6443"}, "changed": false} | |
TASK [kubernetes/kubeadm : Check if kubelet.conf exists] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:48 -0200 (0:00:00.311) 0:03:07.384 ******* | |
ok: [monstrinho] => {"changed": false, "stat": {"atime": 1548774753.9052277, "attr_flags": "", "attributes": [], "block_size": 5632, "blocks": 17, "charset": "us-ascii", "checksum": "a80d023c5e14f086b51a7128e5daff2a3b2a654e", "ctime": 1548774753.9052277, "dev": 26, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 201804, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0600", "mtime": 1548774753.9052277, "nlink": 1, "path": "/etc/kubernetes/kubelet.conf", "pw_name": "root", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 5488, "uid": 0, "version": null, "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/kubeadm : Calculate kubeadm CA cert hash] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.494) 0:03:07.878 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": "openssl x509 -pubkey -in /etc/kubernetes/ssl/ca.crt | openssl rsa -pubin -outform der 2>/dev/null | openssl dgst -sha256 -hex | sed 's/^.* //'", "delta": "0:00:00.005340", "end": "2019-01-29 13:12:50.344202", "rc": 0, "start": "2019-01-29 13:12:50.338862", "stderr": "", "stderr_lines": [], "stdout": "649bb22d95067066936d52cb2c4e21a1aed2fe03a208a18cfd975c671528f1de", "stdout_lines": ["649bb22d95067066936d52cb2c4e21a1aed2fe03a208a18cfd975c671528f1de"]} | |
TASK [kubernetes/kubeadm : Create kubeadm token for joining nodes with 24h expiration (default)] ********************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.487) 0:03:08.366 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "token", "create"], "delta": "0:00:00.028727", "end": "2019-01-29 13:12:50.730972", "rc": 0, "start": "2019-01-29 13:12:50.702245", "stderr": "", "stderr_lines": [], "stdout": "0rtx3q.6kvwllj1akk2polb", "stdout_lines": ["0rtx3q.6kvwllj1akk2polb"]} | |
TASK [kubernetes/kubeadm : gets the kubeadm version] ***************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:49 -0200 (0:00:00.341) 0:03:08.708 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": ["/usr/local/bin/kubeadm", "version", "-o", "short"], "delta": "0:00:00.019003", "end": "2019-01-29 13:12:51.146015", "rc": 0, "start": "2019-01-29 13:12:51.127012", "stderr": "", "stderr_lines": [], "stdout": "v1.13.2", "stdout_lines": ["v1.13.2"]} | |
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha1] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.382) 0:03:09.090 ******* | |
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha2] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.055) 0:03:09.145 ******* | |
TASK [kubernetes/kubeadm : sets kubeadm api version to v1alpha3] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.054) 0:03:09.200 ******* | |
TASK [kubernetes/kubeadm : sets kubeadm api version to v1beta1] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.063) 0:03:09.263 ******* | |
ok: [monstrinho] => {"ansible_facts": {"kubeadmConfig_api_version": "v1beta1"}, "changed": false} | |
TASK [kubernetes/kubeadm : Create kubeadm client config] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.129) 0:03:09.392 ******* | |
TASK [kubernetes/kubeadm : Join to cluster if needed] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.055) 0:03:09.447 ******* | |
TASK [kubernetes/kubeadm : Wait for kubelet bootstrap to create config] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:50 -0200 (0:00:00.053) 0:03:09.501 ******* | |
ok: [monstrinho] => {"changed": false, "elapsed": 1, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/kubernetes/kubelet.conf", "port": null, "search_regex": null, "size": 5488, "state": "file", "uid": 0} | |
TASK [kubernetes/kubeadm : Update server field in kubelet kubeconfig] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:01.560) 0:03:11.062 ******* | |
TASK [kubernetes/kubeadm : Symlink kubelet kubeconfig for calico/canal] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.072) 0:03:11.134 ******* | |
ok: [monstrinho] => {"changed": false, "dest": "/etc/kubernetes/node-kubeconfig.yaml", "gid": 0, "group": "root", "mode": "0777", "owner": "root", "size": 28, "src": "/etc/kubernetes/kubelet.conf", "state": "link", "uid": 0} | |
TASK [kubernetes/kubeadm : Delete kube-proxy daemonset if kube_proxy_remove set, e.g. kube_network_plugin providing proxy services] ********************************************************************************************************** | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.406) 0:03:11.541 ******* | |
TASK [network_plugin/cilium : Cilium | Ensure BFPFS mounted] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.052) 0:03:11.593 ******* | |
TASK [network_plugin/cilium : Cilium | Create Cilium certs directory] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.052) 0:03:11.646 ******* | |
TASK [network_plugin/cilium : Cilium | Link etcd certificates for cilium] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.051) 0:03:11.698 ******* | |
TASK [network_plugin/cilium : Cilium | Create Cilium node manifests] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.072) 0:03:11.771 ******* | |
TASK [network_plugin/cilium : Cilium | Set CNI directory permissions] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:52 -0200 (0:00:00.084) 0:03:11.855 ******* | |
TASK [network_plugin/cilium : Cilium | Create network policy directory] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.051) 0:03:11.907 ******* | |
TASK [network_plugin/calico : include_tasks] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.051) 0:03:11.958 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/check.yml for monstrinho | |
TASK [network_plugin/calico : Check vars defined correctly] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.100) 0:03:12.059 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [network_plugin/calico : Get current version of calico cluster version] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:53 -0200 (0:00:00.159) 0:03:12.218 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl version | grep 'Cluster Version:' | awk '{ print $3}'", "delta": "0:00:02.216940", "end": "2019-01-29 13:12:56.884814", "rc": 0, "start": "2019-01-29 13:12:54.667874", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "v3.1.3", "stdout_lines": ["v3.1.3"]} | |
TASK [network_plugin/calico : Check that calico version is enough for upgrade] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:55 -0200 (0:00:02.616) 0:03:14.835 ******* | |
ok: [monstrinho] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [network_plugin/calico : Set upgrade flag when version needs to be updated] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.143) 0:03:14.979 ******* | |
TASK [network_plugin/calico : include_tasks] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.061) 0:03:15.040 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/pre.yml for monstrinho | |
TASK [network_plugin/calico : Calico | Disable calico-node service if it exists] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.084) 0:03:15.124 ******* | |
ok: [monstrinho] => {"changed": false, "failed_when_result": false, "msg": "Could not find the requested service calico-node: host"} | |
TASK [network_plugin/calico : Calico | Get kubelet hostname] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.439) 0:03:15.564 ******* | |
TASK [network_plugin/calico : Download calico-upgrade tool (force version)] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.081) 0:03:15.645 ******* | |
TASK [network_plugin/calico : Create etcdv2 and etcdv3 calicoApiConfig] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.078) 0:03:15.723 ******* | |
TASK [network_plugin/calico : Tests data migration (dry-run)] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:56 -0200 (0:00:00.088) 0:03:15.812 ******* | |
TASK [network_plugin/calico : If test migration is success continue with calico data real migration] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.078) 0:03:15.891 ******* | |
TASK [network_plugin/calico : include_tasks] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.054) 0:03:15.945 ******* | |
included: /Users/yan/Documents/Projects/monstrinho/kubespray/roles/network_plugin/calico/tasks/install.yml for monstrinho | |
TASK [network_plugin/calico : Calico | Write Calico cni config] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.146) 0:03:16.092 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "8a2188cd8afa74d2810e3f0fcdf47a5b0b3e8612", "dest": "/etc/cni/net.d/10-calico.conflist", "gid": 0, "group": "root", "mode": "0644", "owner": "kube", "path": "/etc/cni/net.d/10-calico.conflist", "size": 763, "state": "file", "uid": 999} | |
TASK [network_plugin/calico : Calico | Create calico certs directory] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:57 -0200 (0:00:00.653) 0:03:16.745 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0750", "owner": "root", "path": "/etc/calico/certs", "size": 5, "state": "directory", "uid": 0} | |
TASK [network_plugin/calico : Calico | Link etcd certificates for calico-node] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:12:58 -0200 (0:00:00.383) 0:03:17.129 ******* | |
ok: [monstrinho] => (item={u's': u'ca.pem', u'd': u'ca_cert.crt'}) => {"changed": false, "dest": "/etc/calico/certs/ca_cert.crt", "gid": 0, "group": "root", "item": {"d": "ca_cert.crt", "s": "ca.pem"}, "mode": "0640", "owner": "kube", "size": 1094, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "hard", "uid": 999} | |
ok: [monstrinho] => (item={u's': u'node-monstrinho.pem', u'd': u'cert.crt'}) => {"changed": false, "dest": "/etc/calico/certs/cert.crt", "gid": 0, "group": "root", "item": {"d": "cert.crt", "s": "node-monstrinho.pem"}, "mode": "0640", "owner": "kube", "size": 1371, "src": "/etc/ssl/etcd/ssl/node-monstrinho.pem", "state": "hard", "uid": 999} | |
ok: [monstrinho] => (item={u's': u'node-monstrinho-key.pem', u'd': u'key.pem'}) => {"changed": false, "dest": "/etc/calico/certs/key.pem", "gid": 0, "group": "root", "item": {"d": "key.pem", "s": "node-monstrinho-key.pem"}, "mode": "0640", "owner": "kube", "size": 1675, "src": "/etc/ssl/etcd/ssl/node-monstrinho-key.pem", "state": "hard", "uid": 999} | |
TASK [network_plugin/calico : Calico | Install calicoctl container script] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:12:58 -0200 (0:00:00.643) 0:03:17.772 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "22393c2aefba8fe8d920ddc4b3d40559e4a0c37f", "dest": "/usr/local/bin/calicoctl", "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/calicoctl", "size": 497, "state": "file", "uid": 0} | |
TASK [network_plugin/calico : Calico | Set cni directory permissions] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:12:59 -0200 (0:00:00.650) 0:03:18.423 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 16, "state": "directory", "uid": 999} | |
TASK [network_plugin/calico : Calico | Copy cni plugins] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:00 -0200 (0:00:00.455) 0:03:18.878 ******* | |
changed: [monstrinho] => {"changed": true, "dest": "/opt/cni/bin", "extract_results": {"cmd": ["/bin/tar", "--extract", "-C", "/opt/cni/bin", "-z", "-f", "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz"], "err": "", "out": "", "rc": 0}, "gid": 0, "group": "root", "handler": "TgzArchive", "mode": "0755", "owner": "root", "size": 16, "src": "/tmp/releases/cni-plugins-amd64-v0.6.0.tgz", "state": "directory", "uid": 0} | |
TASK [network_plugin/calico : Calico | Copy cni plugins from calico/cni container] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:01 -0200 (0:00:01.848) 0:03:20.726 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": ["/usr/bin/docker", "run", "--rm", "-v", "/opt/cni/bin:/cnibindir", "quay.io/calico/cni:v3.1.3", "sh", "-c", "cp /opt/cni/bin/* /cnibindir/"], "delta": "0:00:05.394388", "end": "2019-01-29 13:13:08.546716", "rc": 0, "start": "2019-01-29 13:13:03.152328", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [network_plugin/calico : Calico | wait for etcd] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:07 -0200 (0:00:05.763) 0:03:26.490 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "18", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:13:09 GMT", "json": {"health": "true"}, "msg": "OK (18 bytes)", "redirected": false, "status": 200, "url": "https://10.0.1.2:2379/health"} | |
TASK [network_plugin/calico : Calico | Check if calico network pool has already been configured] ********************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:08 -0200 (0:00:00.568) 0:03:27.058 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": "/usr/local/bin/calicoctl get ippool | grep -w \"10.233.64.0/18\" | wc -l", "delta": "0:00:02.207277", "end": "2019-01-29 13:13:11.605987", "rc": 0, "start": "2019-01-29 13:13:09.398710", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "1", "stdout_lines": ["1"]} | |
TASK [network_plugin/calico : Calico | Configure calico network pool] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:10 -0200 (0:00:02.512) 0:03:29.571 ******* | |
TASK [network_plugin/calico : Calico | Configure calico network pool (legacy)] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.078) 0:03:29.650 ******* | |
TASK [network_plugin/calico : Determine nodeToNodeMesh needed state] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.052) 0:03:29.702 ******* | |
TASK [network_plugin/calico : Calico | Set global as_num] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:10 -0200 (0:00:00.076) 0:03:29.779 ******* | |
changed: [monstrinho -> None] => {"changed": true, "cmd": "echo ' { \"kind\": \"BGPConfiguration\", \"apiVersion\": \"projectcalico.org/v3\", \"metadata\": {\n\"name\": \"default\",\n}, \"spec\": {\n\"logSeverityScreen\": \"Info\",\n\"nodeToNodeMeshEnabled\": true ,\n\"asNumber\": 64512 }} ' | /usr/local/bin/calicoctl create --skip-exists -f -", "delta": "0:00:02.251277", "end": "2019-01-29 13:13:14.410183", "rc": 0, "start": "2019-01-29 13:13:12.158906", "stderr": "WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap.", "stderr_lines": ["WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap."], "stdout": "Successfully created 1 'BGPConfiguration' resource(s)", "stdout_lines": ["Successfully created 1 'BGPConfiguration' resource(s)"]} | |
TASK [network_plugin/calico : Calico | Set global as_num (legacy)] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:02.565) 0:03:32.345 ******* | |
TASK [network_plugin/calico : Calico | Disable node mesh (legacy)] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.401 ******* | |
TASK [network_plugin/calico : Calico | Configure node asNumber for per node peering] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.055) 0:03:32.457 ******* | |
TASK [network_plugin/calico : Calico | Configure node asNumber for per node peering (legacy)] ************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.058) 0:03:32.515 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with router(s) at node scope] ******************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.053) 0:03:32.569 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with router(s) at node scope (legacy)] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.064) 0:03:32.633 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with router(s) at global scope] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.690 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with router(s) at global scope (legacy)] ******************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.056) 0:03:32.746 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with route reflectors] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.059) 0:03:32.806 ******* | |
TASK [network_plugin/calico : Calico | Configure peering with route reflectors (legacy)] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:13 -0200 (0:00:00.046) 0:03:32.852 ******* | |
TASK [network_plugin/calico : Calico | Create calico manifests] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:14 -0200 (0:00:00.045) 0:03:32.897 ******* | |
ok: [monstrinho] => (item={u'type': u'cm', u'name': u'calico-config', u'file': u'calico-config.yml'}) => {"changed": false, "checksum": "8246dc1c482dba4f6d519a952af8522a21923853", "dest": "/etc/kubernetes/calico-config.yml", "gid": 0, "group": "root", "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-config.yml", "size": 312, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'ds', u'name': u'calico-node', u'file': u'calico-node.yml'}) => {"changed": false, "checksum": "d50b4764822c60d08ba78a8c497cfc929d1634e2", "dest": "/etc/kubernetes/calico-node.yml", "gid": 0, "group": "root", "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node.yml", "size": 6887, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'calico', u'file': u'calico-node-sa.yml'}) => {"changed": false, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node-sa.yml", "size": 147, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'calico', u'file': u'calico-cr.yml'}) => {"changed": false, "checksum": "8d6255e0c0cb2959a0628fae6c8ddcb1ba833fa3", "dest": "/etc/kubernetes/calico-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-cr.yml", "size": 341, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'calico', u'file': u'calico-crb.yml'}) => {"changed": false, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-crb.yml", "size": 270, "state": "file", "uid": 0} | |
TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy flannel systemd unit file] ************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:04.241) 0:03:37.139 ******* | |
TASK [network_plugin/flannel : Flannel pre-upgrade | Purge legacy Flannel static pod manifest] *********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.060) 0:03:37.199 ******* | |
TASK [network_plugin/flannel : Flannel pre-upgrade | Remove Flannel's certificate directory not required by CNI] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.054) 0:03:37.253 ******* | |
TASK [network_plugin/flannel : Flannel | Create Flannel manifests] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.053) 0:03:37.307 ******* | |
TASK [network_plugin/weave : Weave | Set cni directory permissions] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.065) 0:03:37.373 ******* | |
TASK [network_plugin/weave : Weave | Copy cni plugins] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.053) 0:03:37.427 ******* | |
TASK [network_plugin/weave : Weave | Create manifest] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.052) 0:03:37.479 ******* | |
TASK [network_plugin/weave : Weave | Fix nodePort for Weave] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.048) 0:03:37.528 ******* | |
TASK [network_plugin/canal : Canal | Write Canal cni config] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.059) 0:03:37.588 ******* | |
TASK [network_plugin/canal : Canal | Create canal certs directory] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.049) 0:03:37.637 ******* | |
TASK [network_plugin/canal : Canal | Link etcd certificates for canal-node] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.052) 0:03:37.690 ******* | |
TASK [network_plugin/canal : Canal | Set Flannel etcd configuration] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:18 -0200 (0:00:00.132) 0:03:37.822 ******* | |
TASK [network_plugin/canal : Canal | Create canal node manifests] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.056) 0:03:37.879 ******* | |
TASK [network_plugin/canal : Canal | Set cni directory permissions] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.104) 0:03:37.983 ******* | |
TASK [network_plugin/canal : Canal | Copy cni plugins] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.050) 0:03:38.034 ******* | |
TASK [network_plugin/canal : Canal | Copy cni plugins from calico/cni] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.084 ******* | |
TASK [network_plugin/canal : Canal | Set cni directory permissions] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.133 ******* | |
TASK [network_plugin/canal : Canal | Install calicoctl container script] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.052) 0:03:38.186 ******* | |
TASK [network_plugin/canal : Canal | Create network policy directory] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.064) 0:03:38.250 ******* | |
TASK [network_plugin/contiv : Contiv | Load openvswitch kernel module] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.053) 0:03:38.304 ******* | |
TASK [network_plugin/contiv : Contiv | Create contiv etcd directories] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.053) 0:03:38.358 ******* | |
TASK [network_plugin/contiv : Contiv | Workaround https://github.com/contiv/netplugin/issues/1152] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.062) 0:03:38.420 ******* | |
TASK [network_plugin/contiv : Contiv | Set necessary facts] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.051) 0:03:38.471 ******* | |
TASK [network_plugin/contiv : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.054) 0:03:38.525 ******* | |
TASK [network_plugin/contiv : Contiv | Create /var/contiv] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.575 ******* | |
TASK [network_plugin/contiv : Contiv | Create contiv config directory] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.052) 0:03:38.627 ******* | |
TASK [network_plugin/contiv : Contiv | Install all Kubernetes resources] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.049) 0:03:38.677 ******* | |
TASK [network_plugin/contiv : Contiv | Copy certs generation script] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.072) 0:03:38.749 ******* | |
TASK [network_plugin/contiv : Contiv | Check for cert key existence] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:19 -0200 (0:00:00.087) 0:03:38.837 ******* | |
TASK [network_plugin/contiv : Contiv | Generate contiv-api-proxy certificates] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.073) 0:03:38.910 ******* | |
TASK [network_plugin/contiv : Contiv | Fetch the generated certificate] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.078) 0:03:38.988 ******* | |
TASK [network_plugin/contiv : Contiv | Copy the generated certificate on nodes] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.064) 0:03:39.052 ******* | |
TASK [network_plugin/contiv : Contiv | Set cni directory permissions] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.063) 0:03:39.116 ******* | |
TASK [network_plugin/contiv : Contiv | Copy cni plugins] ************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.055) 0:03:39.171 ******* | |
TASK [network_plugin/contiv : Contiv | Copy netctl binary from docker container] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.051) 0:03:39.223 ******* | |
TASK [network_plugin/kube-router : kube-router | Add annotations on kube-master] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.053) 0:03:39.276 ******* | |
TASK [network_plugin/kube-router : kube-router | Add annotations on kube-node] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.067) 0:03:39.343 ******* | |
TASK [network_plugin/kube-router : kube-router | Add common annotations on all servers] ****************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.048) 0:03:39.391 ******* | |
TASK [network_plugin/kube-router : kube-roter | Set cni directory permissions] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.049) 0:03:39.441 ******* | |
TASK [network_plugin/kube-router : kube-router | Copy cni plugins] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.493 ******* | |
TASK [network_plugin/kube-router : kube-router | Create manifest] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.050) 0:03:39.543 ******* | |
TASK [network_plugin/cloud : Cloud | Set cni directory permissions] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.595 ******* | |
TASK [network_plugin/cloud : Canal | Copy cni plugins] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.052) 0:03:39.648 ******* | |
TASK [network_plugin/multus : Multus | Copy manifest files] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.051) 0:03:39.699 ******* | |
TASK [network_plugin/multus : Multus | Copy manifest templates] ****************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.080) 0:03:39.779 ******* | |
PLAY [kube-master[0]] ************************************************************************************************************************************************************************************************************************ | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:20 -0200 (0:00:00.067) 0:03:39.847 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:21 -0200 (0:00:00.051) 0:03:39.899 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:21 -0200 (0:00:00.520) 0:03:40.419 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.506) 0:03:40.925 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.051) 0:03:40.977 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token name] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.127) 0:03:41.104 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get secrets -o custom-columns=name:{.metadata.name} --no-headers | grep -m1 default-token", "delta": "0:00:00.100540", "end": "2019-01-29 13:13:23.536631", "rc": 0, "start": "2019-01-29 13:13:23.436091", "stderr": "", "stderr_lines": [], "stdout": "default-token-hj59b", "stdout_lines": ["default-token-hj59b"]} | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get default token data] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.356) 0:03:41.461 ******* | |
ok: [monstrinho] => {"changed": false, "cmd": ["/usr/local/bin/kubectl", "--kubeconfig", "/etc/kubernetes/admin.conf", "get", "secrets", "default-token-hj59b", "-ojson"], "delta": "0:00:00.080401", "end": "2019-01-29 13:13:23.845743", "rc": 0, "start": "2019-01-29 13:13:23.765342", "stderr": "", "stderr_lines": [], "stdout": "{\n \"apiVersion\": \"v1\",\n \"data\": {\n \"ca.crt\": \"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\",\n \"namespace\": \"ZGVmYXVsdA==\",\n \"token\": \"ZXlKaGJHY2lPaUpTVXpJMU5pSXNJbXRwWkNJNklpSjkuZXlKcGMzTWlPaUpyZFdKbGNtNWxkR1Z6TDNObGNuWnBZMlZoWTJOdmRXNTBJaXdpYTNWaVpYSnVaWFJsY3k1cGJ5OXpaWEoyYVdObFlXTmpiM1Z1ZEM5dVlXMWxjM0JoWTJVaU9pSmtaV1poZFd4MElpd2lhM1ZpWlhKdVpYUmxjeTVwYnk5elpYSjJhV05sWVdOamIzVnVkQzl6WldOeVpYUXVibUZ0WlNJNkltUmxabUYxYkhRdGRHOXJaVzR0YUdvMU9XSWlMQ0pyZFdKbGNtNWxkR1Z6TG1sdkwzTmxjblpwWTJWaFkyTnZkVzUwTDNObGNuWnBZMlV0WVdOamIzVnVkQzV1WVcxbElqb2laR1ZtWVhWc2RDSXNJbXQxWW1WeWJtVjBaWE11YVc4dmMyVnlkbWxqWldGalkyOTFiblF2YzJWeWRtbGpaUzFoWTJOdmRXNTBMblZwWkNJNklqaGtaVGszTnpkbExUSXlZak10TVRGbE9TMDRNekl5TFRjd09EVmpNak14T0dZMU1DSXNJbk4xWWlJNkluTjVjM1JsYlRwelpYSjJhV05sWVdOamIzVnVkRHBrWldaaGRXeDBPbVJsWm1GMWJIUWlmUS5SZG5uRTFiaHdiM2JVdjhiSHFmRmJiS2JwLUNFTFBRay1vMUZUWGpScUFONFROc3p1dFlOeXJLVlV1YVhSdHduRGkyLU0zTmVQYkdlQ0w4bEVrUlBlV2RLQklTWjcwM2pyLTVQZ1l6bzBJeGZ1alM0czN0eDlESHlwdmlELTdGZ0o4Z0NxNGVhenNXSEtIdHBBX2dOYldfay13dnBYQUpHNE9SZkFCUVhIMFB3cHNCd1MtZmJHcXZzMnNYajdqZFZRTTBrOWMzejk3NUdNV2ZKbEhscHQyaU9VdE54SkF5VHZJNURBYWdSVDRVa25QSTRlUlpsanRqUnMwUlNFaWpfS252NTBlTG1VcG5UWVYxQ1ZnTUsxWno0VlhkMy1WUFNGSGpiTGx2eUh6U3BCNTIyd1d1UEJMMnA5TEZCOFJYMXBkNzhXU001ZWFuVEFOVmwtd0FkM0E=\"\n },\n \"kind\": \"Secret\",\n \"metadata\": {\n \"annotations\": {\n \"kubernetes.io/service-account.name\": \"default\",\n \"kubernetes.io/service-account.uid\": \"8de9777e-22b3-11e9-8322-7085c2318f50\"\n },\n \"creationTimestamp\": \"2019-01-29T14:49:11Z\",\n \"name\": \"default-token-hj59b\",\n \"namespace\": \"default\",\n \"resourceVersion\": \"51054\",\n \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hj59b\",\n \"uid\": \"0a0254fe-23d5-11e9-abfe-7085c2318f50\"\n },\n \"type\": \"kubernetes.io/service-account-token\"\n}", "stdout_lines": ["{", " \"apiVersion\": \"v1\",", " \"data\": {", " \"ca.crt\": \"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\",", " \"namespace\": \"ZGVmYXVsdA==\",", " \"token\": \"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\"", " },", " \"kind\": \"Secret\",", " \"metadata\": {", " \"annotations\": {", " \"kubernetes.io/service-account.name\": \"default\",", " \"kubernetes.io/service-account.uid\": \"8de9777e-22b3-11e9-8322-7085c2318f50\"", " },", " \"creationTimestamp\": \"2019-01-29T14:49:11Z\",", " \"name\": \"default-token-hj59b\",", " \"namespace\": \"default\",", " \"resourceVersion\": \"51054\",", " \"selfLink\": \"/api/v1/namespaces/default/secrets/default-token-hj59b\",", " \"uid\": \"0a0254fe-23d5-11e9-abfe-7085c2318f50\"", " },", " \"type\": \"kubernetes.io/service-account-token\"", "}"]} | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Test if default certificate is expired] ************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:22 -0200 (0:00:00.305) 0:03:41.767 ******* | |
ok: [monstrinho] => {"changed": false, "connection": "close", "content": "{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"nodes is forbidden: User \\\"system:serviceaccount:default:default\\\" cannot list resource \\\"nodes\\\" in API group \\\"\\\" at the cluster scope\",\"reason\":\"Forbidden\",\"details\":{\"kind\":\"nodes\"},\"code\":403}\n", "content_length": "277", "content_type": "application/json", "date": "Tue, 29 Jan 2019 15:13:24 GMT", "failed_when_result": false, "json": {"apiVersion": "v1", "code": 403, "details": {"kind": "nodes"}, "kind": "Status", "message": "nodes is forbidden: User \"system:serviceaccount:default:default\" cannot list resource \"nodes\" in API group \"\" at the cluster scope", "metadata": {}, "reason": "Forbidden", "status": "Failure"}, "msg": "Status code was 403 and not [200]: HTTP Error 403: Forbidden", "redirected": false, "status": 403, "url": "https://10.233.0.1/api/v1/nodes", "x_content_type_options": "nosniff"} | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Determine if certificate is expired] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.454) 0:03:42.221 ******* | |
ok: [monstrinho] => {"ansible_facts": {"needs_rotation": false}, "changed": false} | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Get all serviceaccount tokens to expire] *********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.134) 0:03:42.356 ******* | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete expired tokens] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.051) 0:03:42.407 ******* | |
TASK [kubernetes-apps/rotate_tokens : Rotate Tokens | Delete pods in system namespace] ******************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.055) 0:03:42.463 ******* | |
TASK [win_nodes/kubernetes_patch : Ensure that user manifests directory exists] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.052) 0:03:42.515 ******* | |
ok: [monstrinho] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/root/kube-manifests/kubernetes", "size": 2, "state": "directory", "uid": 0} | |
TASK [win_nodes/kubernetes_patch : Copy kube-proxy daemonset hostnameOverride patch] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:23 -0200 (0:00:00.239) 0:03:42.754 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "705b8362a76969e679cdc1f774f3cd704a2e73d7", "dest": "/root/kube-manifests/hostnameOverride-patch.json", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/root/kube-manifests/hostnameOverride-patch.json", "size": 537, "state": "file", "uid": 0} | |
TASK [win_nodes/kubernetes_patch : Check current command for kube-proxy daemonset] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:24 -0200 (0:00:00.467) 0:03:43.222 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get ds kube-proxy --namespace=kube-system -o jsonpath='{.spec.template.spec.containers[0].command}'", "delta": "0:00:00.100370", "end": "2019-01-29 13:13:25.652862", "rc": 0, "start": "2019-01-29 13:13:25.552492", "stderr": "", "stderr_lines": [], "stdout": "[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME) --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME}]", "stdout_lines": ["[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME) --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME} --hostname-override=${NODE_NAME}]"]} | |
TASK [win_nodes/kubernetes_patch : Apply hostnameOverride patch for kube-proxy daemonset] **************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:24 -0200 (0:00:00.349) 0:03:43.572 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf patch ds kube-proxy --namespace=kube-system --type=json -p \"$(cat hostnameOverride-patch.json)\"", "delta": "0:00:00.132416", "end": "2019-01-29 13:13:26.039656", "rc": 0, "start": "2019-01-29 13:13:25.907240", "stderr": "", "stderr_lines": [], "stdout": "daemonset.extensions/kube-proxy patched", "stdout_lines": ["daemonset.extensions/kube-proxy patched"]} | |
TASK [win_nodes/kubernetes_patch : debug] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.395) 0:03:43.968 ******* | |
ok: [monstrinho] => { | |
"msg": [ | |
"daemonset.extensions/kube-proxy patched" | |
] | |
} | |
TASK [win_nodes/kubernetes_patch : debug] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.132) 0:03:44.100 ******* | |
ok: [monstrinho] => { | |
"msg": [] | |
} | |
TASK [win_nodes/kubernetes_patch : Copy kube-proxy daemonset nodeselector patch] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.134) 0:03:44.234 ******* | |
ok: [monstrinho] => {"changed": false, "checksum": "7a623f3b1dbed6c45b190d209c0ff765511fe176", "dest": "/root/kube-manifests/nodeselector-os-linux-patch.json", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/root/kube-manifests/nodeselector-os-linux-patch.json", "size": 81, "state": "file", "uid": 0} | |
TASK [win_nodes/kubernetes_patch : Check current nodeselector for kube-proxy daemonset] ****************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:25 -0200 (0:00:00.556) 0:03:44.791 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf get ds kube-proxy --namespace=kube-system -o jsonpath='{.spec.template.spec.nodeSelector.beta.kubernetes.io/os}'", "delta": "0:00:00.082311", "end": "2019-01-29 13:13:27.240546", "rc": 0, "start": "2019-01-29 13:13:27.158235", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [win_nodes/kubernetes_patch : Apply nodeselector patch for kube-proxy daemonset] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.371) 0:03:45.163 ******* | |
changed: [monstrinho] => {"changed": true, "cmd": "/usr/local/bin/kubectl --kubeconfig /etc/kubernetes/admin.conf patch ds kube-proxy --namespace=kube-system --type=strategic -p \"$(cat nodeselector-os-linux-patch.json)\"", "delta": "0:00:00.148365", "end": "2019-01-29 13:13:27.626430", "rc": 0, "start": "2019-01-29 13:13:27.478065", "stderr": "", "stderr_lines": [], "stdout": "daemonset.extensions/kube-proxy patched (no change)", "stdout_lines": ["daemonset.extensions/kube-proxy patched (no change)"]} | |
TASK [win_nodes/kubernetes_patch : debug] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.407) 0:03:45.571 ******* | |
ok: [monstrinho] => { | |
"msg": [ | |
"daemonset.extensions/kube-proxy patched (no change)" | |
] | |
} | |
TASK [win_nodes/kubernetes_patch : debug] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.129) 0:03:45.700 ******* | |
ok: [monstrinho] => { | |
"msg": [] | |
} | |
PLAY [kube-master] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:26 -0200 (0:00:00.149) 0:03:45.849 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:27 -0200 (0:00:00.051) 0:03:45.901 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:27 -0200 (0:00:00.518) 0:03:46.420 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.501) 0:03:46.921 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.051) 0:03:46.972 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes-apps/network_plugin/cilium : Cilium | Start Resources] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.123) 0:03:47.096 ******* | |
TASK [kubernetes-apps/network_plugin/cilium : Cilium | Wait for pods to run] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.086) 0:03:47.183 ******* | |
TASK [kubernetes-apps/network_plugin/calico : Start Calico resources] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:28 -0200 (0:00:00.050) 0:03:47.233 ******* | |
ok: [monstrinho] => (item=calico-config.yml) => {"changed": false, "item": {"changed": false, "checksum": "8246dc1c482dba4f6d519a952af8522a21923853", "dest": "/etc/kubernetes/calico-config.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-config.yml"}, "before": {"path": "/etc/kubernetes/calico-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-config.yml", "name": "calico-config", "type": "cm"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-config.yml", "size": 312, "state": "file", "uid": 0}, "msg": "success: configmap/calico-config unchanged"} | |
ok: [monstrinho] => (item=calico-node.yml) => {"changed": false, "item": {"changed": false, "checksum": "d50b4764822c60d08ba78a8c497cfc929d1634e2", "dest": "/etc/kubernetes/calico-node.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-node.yml"}, "before": {"path": "/etc/kubernetes/calico-node.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-node.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-node.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-node.yml", "name": "calico-node", "type": "ds"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node.yml", "size": 6887, "state": "file", "uid": 0}, "msg": "success: daemonset.extensions/calico-node configured"} | |
ok: [monstrinho] => (item=calico-node-sa.yml) => {"changed": false, "item": {"changed": false, "checksum": "c94d2aa63492bb9c1462f1d8440e047cfd0b5f51", "dest": "/etc/kubernetes/calico-node-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-node-sa.yml"}, "before": {"path": "/etc/kubernetes/calico-node-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-node-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-node-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-node-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-node-sa.yml", "name": "calico", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-node-sa.yml", "size": 147, "state": "file", "uid": 0}, "msg": "success: serviceaccount/calico-node unchanged"} | |
ok: [monstrinho] => (item=calico-cr.yml) => {"changed": false, "item": {"changed": false, "checksum": "8d6255e0c0cb2959a0628fae6c8ddcb1ba833fa3", "dest": "/etc/kubernetes/calico-cr.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-cr.yml"}, "before": {"path": "/etc/kubernetes/calico-cr.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-cr.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-cr.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-cr.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-cr.yml", "name": "calico", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-cr.yml", "size": 341, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/calico-node unchanged"} | |
ok: [monstrinho] => (item=calico-crb.yml) => {"changed": false, "item": {"changed": false, "checksum": "4c242c0edb1c62b5a759af67900bdda8df83420a", "dest": "/etc/kubernetes/calico-crb.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-crb.yml"}, "before": {"path": "/etc/kubernetes/calico-crb.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-crb.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-crb.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-crb.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-crb.yml", "name": "calico", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-crb.yml", "size": 270, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/calico-node unchanged"} | |
TASK [kubernetes-apps/network_plugin/calico : calico upgrade complete] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:03.689) 0:03:50.923 ******* | |
TASK [kubernetes-apps/network_plugin/canal : Canal | Start Resources] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.059) 0:03:50.982 ******* | |
TASK [kubernetes-apps/network_plugin/flannel : Flannel | Start Resources] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.104) 0:03:51.087 ******* | |
TASK [kubernetes-apps/network_plugin/flannel : Flannel | Wait for flannel subnet.env file presence] ****************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.064) 0:03:51.151 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create Kubernetes resources] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.049) 0:03:51.201 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Wait for netmaster] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.253 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get global configuration] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.307 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : set_fact] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.049) 0:03:51.356 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global forwarding mode] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.061) 0:03:51.418 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set global fabric mode] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.471 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Set peer hostname] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.050) 0:03:51.521 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get BGP configuration] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.058) 0:03:51.580 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Configure peering with router(s)] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.054) 0:03:51.635 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Get existing networks] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.055) 0:03:51.690 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create networks] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.743 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Check if default group exists] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.053) 0:03:51.796 ******* | |
TASK [kubernetes-apps/network_plugin/contiv : Contiv | Create default group] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:32 -0200 (0:00:00.052) 0:03:51.849 ******* | |
TASK [kubernetes-apps/network_plugin/weave : Weave | Start Resources] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.052) 0:03:51.902 ******* | |
TASK [kubernetes-apps/network_plugin/weave : Weave | Wait for Weave to become available] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.051) 0:03:51.953 ******* | |
TASK [kubernetes-apps/network_plugin/kube-router : kube-router | Start Resources] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.063) 0:03:52.017 ******* | |
TASK [kubernetes-apps/network_plugin/kube-router : kube-router | Wait for kube-router pods to be ready] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.051) 0:03:52.069 ******* | |
TASK [kubernetes-apps/network_plugin/multus : Multus | Start resources] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.049) 0:03:52.118 ******* | |
TASK [policy_controller/calico : Set cert dir] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.083) 0:03:52.202 ******* | |
TASK [policy_controller/calico : Create calico-kube-controllers manifests] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:33 -0200 (0:00:00.059) 0:03:52.261 ******* | |
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'calico-kube-controllers', u'file': u'calico-kube-controllers.yml'}) => {"changed": false, "checksum": "14ced9cb1d4a926c838be5a793c5e0a5cf3ec3cf", "dest": "/etc/kubernetes/calico-kube-controllers.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-controllers.yml", "name": "calico-kube-controllers", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-controllers.yml", "size": 1650, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'calico-kube-controllers', u'file': u'calico-kube-sa.yml'}) => {"changed": false, "checksum": "9b599bf59cbdd85628410da40ac05a01f7985d1b", "dest": "/etc/kubernetes/calico-kube-sa.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-sa.yml", "name": "calico-kube-controllers", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-sa.yml", "size": 159, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'calico-kube-controllers', u'file': u'calico-kube-cr.yml'}) => {"changed": false, "checksum": "328b854512a0ae28be6492554a7fa187e5e5cc14", "dest": "/etc/kubernetes/calico-kube-cr.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-cr.yml", "name": "calico-kube-controllers", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-cr.yml", "size": 446, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'calico-kube-controllers', u'file': u'calico-kube-crb.yml'}) => {"changed": false, "checksum": "a0ab18747c1c4701bf329d27e1442e006709c1fb", "dest": "/etc/kubernetes/calico-kube-crb.yml", "gid": 0, "group": "root", "item": {"file": "calico-kube-crb.yml", "name": "calico-kube-controllers", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-crb.yml", "size": 306, "state": "file", "uid": 0} | |
TASK [policy_controller/calico : Start of Calico kube controllers] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:35 -0200 (0:00:01.888) 0:03:54.150 ******* | |
ok: [monstrinho] => (item=calico-kube-controllers.yml) => {"changed": false, "item": {"changed": false, "checksum": "14ced9cb1d4a926c838be5a793c5e0a5cf3ec3cf", "dest": "/etc/kubernetes/calico-kube-controllers.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-controllers.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-controllers.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-controllers.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-controllers.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-controllers.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-controllers.yml", "name": "calico-kube-controllers", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-controllers.yml", "size": 1650, "state": "file", "uid": 0}, "msg": "success: deployment.apps/calico-kube-controllers configured"} | |
ok: [monstrinho] => (item=calico-kube-sa.yml) => {"changed": false, "item": {"changed": false, "checksum": "9b599bf59cbdd85628410da40ac05a01f7985d1b", "dest": "/etc/kubernetes/calico-kube-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-sa.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-sa.yml", "name": "calico-kube-controllers", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-sa.yml", "size": 159, "state": "file", "uid": 0}, "msg": "success: serviceaccount/calico-kube-controllers unchanged"} | |
ok: [monstrinho] => (item=calico-kube-cr.yml) => {"changed": false, "item": {"changed": false, "checksum": "328b854512a0ae28be6492554a7fa187e5e5cc14", "dest": "/etc/kubernetes/calico-kube-cr.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-cr.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-cr.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-cr.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-cr.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-cr.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-cr.yml", "name": "calico-kube-controllers", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-cr.yml", "size": 446, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/calico-kube-controllers unchanged"} | |
ok: [monstrinho] => (item=calico-kube-crb.yml) => {"changed": false, "item": {"changed": false, "checksum": "a0ab18747c1c4701bf329d27e1442e006709c1fb", "dest": "/etc/kubernetes/calico-kube-crb.yml", "diff": {"after": {"path": "/etc/kubernetes/calico-kube-crb.yml"}, "before": {"path": "/etc/kubernetes/calico-kube-crb.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "calico-kube-crb.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/calico-kube-crb.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/calico-kube-crb.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "calico-kube-crb.yml", "name": "calico-kube-controllers", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/calico-kube-crb.yml", "size": 306, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/calico-kube-controllers unchanged"} | |
TASK [policy_controller/calico : Set cert dir] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:02.166) 0:03:56.316 ******* | |
TASK [policy_controller/calico : Create calico-kube-controllers manifests] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.054) 0:03:56.370 ******* | |
TASK [policy_controller/calico : Start of Calico kube controllers] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.078) 0:03:56.449 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy addon dir and manifests] ******************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.077) 0:03:56.526 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Remove legacy namespace] ********************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.575 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create addon dir] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.623 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Templates list] ****************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.047) 0:03:56.671 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Append extra templates to NGINX Ingress Templates list for PodSecurityPolicy] **************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.719 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Create manifests] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.048) 0:03:56.768 ******* | |
TASK [kubernetes-apps/ingress_controller/ingress_nginx : NGINX Ingress Controller | Apply manifests] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.052) 0:03:56.821 ******* | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy addon dir and manifests] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:37 -0200 (0:00:00.049) 0:03:56.871 ******* | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Remove legacy namespace] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.051) 0:03:56.922 ******* | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create addon dir] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:56.971 ******* | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Create manifests] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.046) 0:03:57.018 ******* | |
TASK [kubernetes-apps/ingress_controller/cert_manager : Cert Manager | Apply manifests] ****************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.096) 0:03:57.114 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Ensure base dir is created on all hosts] **************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.128) 0:03:57.243 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create addon dir] *************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.055) 0:03:57.298 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Templates list] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.347 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Insert extra templates to Local Volume Provisioner templates list for PodSecurityPolicy] **************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.049) 0:03:57.397 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Create manifests] *************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.047) 0:03:57.444 ******* | |
TASK [kubernetes-apps/external_provisioner/local_volume_provisioner : Local Volume Provisioner | Apply manifests] **************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.049) 0:03:57.494 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy addon dir and manifests] ****************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.062) 0:03:57.556 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy namespace] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.604 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Remove legacy storageclass] ***************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.653 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create addon dir] *************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.701 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Templates list] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.750 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Append extra templates to CephFS Provisioner Templates list for PodSecurityPolicy] ********************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.048) 0:03:57.798 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Create manifests] *************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:38 -0200 (0:00:00.047) 0:03:57.846 ******* | |
TASK [kubernetes-apps/external_provisioner/cephfs_provisioner : CephFS Provisioner | Apply manifests] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.049) 0:03:57.895 ******* | |
PLAY [calico-rr] ***************************************************************************************************************************************************************************************************************************** | |
skipping: no hosts matched | |
PLAY [k8s-cluster] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.096) 0:03:57.991 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.050) 0:03:58.042 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:39 -0200 (0:00:00.628) 0:03:58.670 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.624) 0:03:59.295 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.052) 0:03:59.347 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [dnsmasq : ensure dnsmasq.d directory exists] ******************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.256) 0:03:59.604 ******* | |
TASK [dnsmasq : ensure dnsmasq.d-available directory exists] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.053) 0:03:59.658 ******* | |
TASK [dnsmasq : check system nameservers] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.049) 0:03:59.707 ******* | |
TASK [dnsmasq : init system_and_upstream_dns_servers] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.054) 0:03:59.762 ******* | |
TASK [dnsmasq : combine upstream_dns_servers and system nameservers (only for docker_dns)] *************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.048) 0:03:59.810 ******* | |
TASK [dnsmasq : Write dnsmasq configuration] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:40 -0200 (0:00:00.056) 0:03:59.867 ******* | |
TASK [dnsmasq : Stat dnsmasq link] *********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.250) 0:04:00.117 ******* | |
TASK [dnsmasq : Stat dnsmasq link] *********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.054) 0:04:00.171 ******* | |
TASK [dnsmasq : Move previous configuration] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.220 ******* | |
TASK [dnsmasq : Enable dnsmasq configuration] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.050) 0:04:00.271 ******* | |
TASK [dnsmasq : Create dnsmasq RBAC manifests] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.074) 0:04:00.345 ******* | |
TASK [dnsmasq : Apply dnsmasq RBAC manifests] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.087) 0:04:00.433 ******* | |
TASK [dnsmasq : Create dnsmasq manifests] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.083) 0:04:00.516 ******* | |
TASK [dnsmasq : Start Resources] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.110) 0:04:00.626 ******* | |
TASK [dnsmasq : Check for dnsmasq port (pulling image and running container)] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.071) 0:04:00.698 ******* | |
TASK [adduser : User | Create User Group] **************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.748 ******* | |
TASK [adduser : User | Create User] ********************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.049) 0:04:00.797 ******* | |
TASK [kubernetes/preinstall : Remove swapfile from /etc/fstab] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:41 -0200 (0:00:00.052) 0:04:00.850 ******* | |
TASK [kubernetes/preinstall : Disable swap] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.060) 0:04:00.911 ******* | |
TASK [kubernetes/preinstall : Stop if ansible version is too low] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:00.961 ******* | |
TASK [kubernetes/preinstall : Stop if either kube-master, kube-node or etcd is empty] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.011 ******* | |
TASK [kubernetes/preinstall : Stop if non systemd OS type] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.068) 0:04:01.080 ******* | |
TASK [kubernetes/preinstall : Stop if unknown OS] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.131 ******* | |
TASK [kubernetes/preinstall : Stop if unknown network plugin] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.064) 0:04:01.195 ******* | |
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.051) 0:04:01.246 ******* | |
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] *********************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.053) 0:04:01.299 ******* | |
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.088) 0:04:01.388 ******* | |
TASK [kubernetes/preinstall : Stop if memory is too small for masters] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.438 ******* | |
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.488 ******* | |
TASK [kubernetes/preinstall : Guarantee that enough network address space is available for all pods] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.537 ******* | |
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.587 ******* | |
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.638 ******* | |
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.688 ******* | |
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when OCI cloud controller is enabled] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.049) 0:04:01.737 ******* | |
TASK [kubernetes/preinstall : Stop if RBAC and anonymous-auth are not enabled when insecure port is disabled] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.064) 0:04:01.801 ******* | |
TASK [kubernetes/preinstall : Stop if kernel version is too low] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:42 -0200 (0:00:00.050) 0:04:01.852 ******* | |
TASK [kubernetes/preinstall : Stop if bad hostname] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:01.904 ******* | |
TASK [kubernetes/preinstall : check cloud_provider value] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:01.954 ******* | |
TASK [kubernetes/preinstall : Get current version of calico cluster version] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.071) 0:04:02.026 ******* | |
TASK [kubernetes/preinstall : Check that calico version is enough for upgrade] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.078 ******* | |
TASK [kubernetes/preinstall : Check that kube_service_addresses is a network range] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.129 ******* | |
TASK [kubernetes/preinstall : Check that kube_pods_subnet is a network range] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.052) 0:04:02.181 ******* | |
TASK [kubernetes/preinstall : Check that kube_pods_subnet does not collide with kube_service_addresses] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.233 ******* | |
TASK [kubernetes/preinstall : Stop if unknown dns mode] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.284 ******* | |
TASK [kubernetes/preinstall : Stop if unknown kube proxy mode] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:02.335 ******* | |
TASK [kubernetes/preinstall : Stop if vault is chose] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.064) 0:04:02.399 ******* | |
TASK [kubernetes/preinstall : Stop if unknown cert_management] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.453 ******* | |
TASK [kubernetes/preinstall : Stop if unknown resolvconf_mode] ******************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.052) 0:04:02.505 ******* | |
TASK [kubernetes/preinstall : Pre-upgrade | check if old credential dir exists] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.560 ******* | |
TASK [kubernetes/preinstall : Pre-upgrade | check if new credential dir exists] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.058) 0:04:02.619 ******* | |
TASK [kubernetes/preinstall : Pre-upgrade | move data from old credential dir to new] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.059) 0:04:02.679 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.051) 0:04:02.730 ******* | |
TASK [kubernetes/preinstall : ansible_architecture_rename] *********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.050) 0:04:02.780 ******* | |
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] ******************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:43 -0200 (0:00:00.054) 0:04:02.835 ******* | |
TASK [kubernetes/preinstall : check if atomic host] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:02.885 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.064) 0:04:02.949 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.052) 0:04:03.001 ******* | |
TASK [kubernetes/preinstall : check resolvconf] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.052 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.102 ******* | |
TASK [kubernetes/preinstall : set_fact] ****************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.053) 0:04:03.155 ******* | |
TASK [kubernetes/preinstall : check if kubelet is configured] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.205 ******* | |
TASK [kubernetes/preinstall : check if early DNS configuration stage] ************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.256 ******* | |
TASK [kubernetes/preinstall : target resolv.conf files] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.306 ******* | |
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] *************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.356 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.406 ******* | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.455 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.053) 0:04:03.509 ******* | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.063) 0:04:03.573 ******* | |
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.623 ******* | |
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.674 ******* | |
TASK [kubernetes/preinstall : generate search domains to resolvconf] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.051) 0:04:03.726 ******* | |
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.050) 0:04:03.776 ******* | |
TASK [kubernetes/preinstall : generate nameservers to resolvconf] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:44 -0200 (0:00:00.049) 0:04:03.826 ******* | |
TASK [kubernetes/preinstall : gather os specific variables] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:03.878 ******* | |
TASK [kubernetes/preinstall : force kube_proxy removal if proxy services are replaced by other means] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.065) 0:04:03.943 ******* | |
TASK [kubernetes/preinstall : override kube_proxy_mode to ipvs if kube_proxy_remove is set, as ipvs won't require kube-proxy cleanup when kube-proxy daemonset gets deleted] ***************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.053) 0:04:03.997 ******* | |
TASK [kubernetes/preinstall : Create kubernetes directories] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.049) 0:04:04.046 ******* | |
TASK [kubernetes/preinstall : Create cni directories] **************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.097) 0:04:04.144 ******* | |
TASK [kubernetes/preinstall : Create local volume provisioner directories] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.083) 0:04:04.227 ******* | |
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] ****************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.065) 0:04:04.293 ******* | |
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.050) 0:04:04.343 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] ********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.395 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.081) 0:04:04.476 ******* | |
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.082) 0:04:04.558 ******* | |
TASK [kubernetes/preinstall : persist resolvconf cloud init file] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.610 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM)] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.661 ******* | |
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] *********************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.052) 0:04:04.714 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.049) 0:04:04.763 ******* | |
TASK [kubernetes/preinstall : Update package management cache (zypper) - SUSE] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:45 -0200 (0:00:00.051) 0:04:04.815 ******* | |
TASK [kubernetes/preinstall : Update package management cache (APT)] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.063) 0:04:04.879 ******* | |
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.051) 0:04:04.930 ******* | |
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] ************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.051) 0:04:04.981 ******* | |
TASK [kubernetes/preinstall : Update common_required_pkgs with ipvsadm when kube_proxy_mode is ipvs] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.049) 0:04:05.031 ******* | |
TASK [kubernetes/preinstall : Install packages requirements] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.082 ******* | |
TASK [kubernetes/preinstall : Install ipvsadm for ClearLinux] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.092) 0:04:05.174 ******* | |
TASK [kubernetes/preinstall : Confirm selinux deployed] ************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.225 ******* | |
TASK [kubernetes/preinstall : Set selinux policy] ******************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.277 ******* | |
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] *************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.055) 0:04:05.332 ******* | |
TASK [kubernetes/preinstall : Stat sysctl file configuration] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.054) 0:04:05.386 ******* | |
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.438 ******* | |
TASK [kubernetes/preinstall : Make sure sysctl file path folder exists] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.066) 0:04:05.505 ******* | |
TASK [kubernetes/preinstall : Enable ip forwarding] ****************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.055) 0:04:05.560 ******* | |
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.053) 0:04:05.614 ******* | |
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] ********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.664 ******* | |
TASK [kubernetes/preinstall : Hosts | Retrieve hosts file content] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.052) 0:04:05.716 ******* | |
TASK [kubernetes/preinstall : Hosts | Extract existing entries for localhost from hosts file] ************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.050) 0:04:05.767 ******* | |
TASK [kubernetes/preinstall : Hosts | Update target hosts file entries dict with required entries] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:46 -0200 (0:00:00.057) 0:04:05.824 ******* | |
TASK [kubernetes/preinstall : Hosts | Update (if necessary) hosts file] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.072) 0:04:05.897 ******* | |
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.072) 0:04:05.970 ******* | |
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (non-RH)] ************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.024 ******* | |
TASK [kubernetes/preinstall : Configure dhclient hooks for resolv.conf (RH-only)] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.053) 0:04:06.077 ******* | |
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.067) 0:04:06.144 ******* | |
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] *********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.199 ******* | |
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.253 ******* | |
TASK [kubernetes/preinstall : install growpart] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.305 ******* | |
TASK [kubernetes/preinstall : check if growpart needs to be run] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.358 ******* | |
TASK [kubernetes/preinstall : check fs type] ************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.054) 0:04:06.412 ******* | |
TASK [kubernetes/preinstall : run growpart] ************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.070) 0:04:06.483 ******* | |
TASK [kubernetes/preinstall : run xfs_growfs] ************************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.068) 0:04:06.552 ******* | |
PLAY [kube-master] *************************************************************************************************************************************************************************************************************************** | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.088) 0:04:06.641 ******* | |
TASK [download : Download items] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:47 -0200 (0:00:00.052) 0:04:06.693 ******* | |
TASK [download : Sync container] ************************************************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.539) 0:04:07.233 ******* | |
TASK [download : include_tasks] ************************************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.513) 0:04:07.746 ******* | |
TASK [kubespray-defaults : Configure defaults] *********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:48 -0200 (0:00:00.052) 0:04:07.798 ******* | |
ok: [monstrinho] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Wait for kube-apiserver] ******************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:49 -0200 (0:00:00.128) 0:04:07.927 ******* | |
ok: [monstrinho] => {"attempts": 1, "changed": false, "connection": "close", "content_length": "2", "content_type": "text/plain; charset=utf-8", "cookies": {}, "cookies_string": "", "date": "Tue, 29 Jan 2019 15:13:50 GMT", "msg": "OK (2 bytes)", "redirected": false, "status": 200, "url": "https://127.0.0.1:6443/healthz"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old CoreDNS resources] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:49 -0200 (0:00:00.509) 0:04:08.437 ******* | |
ok: [monstrinho] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: deployment.extensions \"coredns\" deleted"} | |
ok: [monstrinho] => (item=configmap) => {"changed": false, "item": "configmap", "msg": "success: configmap \"coredns\" deleted"} | |
ok: [monstrinho] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: service \"coredns\" deleted"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old nodelocalDNS resources] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:13:51 -0200 (0:00:01.689) 0:04:10.126 ******* | |
ok: [monstrinho] => (item=deamonset) => {"changed": false, "item": "deamonset", "msg": "success: "} | |
ok: [monstrinho] => (item=configmap) => {"changed": false, "item": "configmap", "msg": "success: "} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm CoreDNS] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:53 -0200 (0:00:02.602) 0:04:12.729 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old KubeDNS resources] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:53 -0200 (0:00:00.060) 0:04:12.789 ******* | |
ok: [monstrinho] => (item=deploy) => {"changed": false, "item": "deploy", "msg": "success: "} | |
ok: [monstrinho] => (item=svc) => {"changed": false, "item": "svc", "msg": "success: "} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete kubeadm KubeDNS] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.546) 0:04:13.336 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old KubeDNS Autoscaler deployment] ************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.073) 0:04:13.410 ******* | |
ok: [monstrinho] => {"changed": false, "msg": "success: "} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:13:54 -0200 (0:00:00.394) 0:04:13.804 ******* | |
ok: [monstrinho] => (item={u'type': u'configmap', u'name': u'coredns', u'file': u'coredns-config.yml'}) => {"changed": false, "checksum": "cf2b13b37cf3dae2789fb97755da2a649d3498fe", "dest": "/etc/kubernetes/coredns-config.yml", "gid": 0, "group": "root", "item": {"file": "coredns-config.yml", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 509, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'coredns', u'file': u'coredns-sa.yml'}) => {"changed": false, "checksum": "bbdff809c4fa8335354b4a1caf9e7de7d5873edc", "dest": "/etc/kubernetes/coredns-sa.yml", "gid": 0, "group": "root", "item": {"file": "coredns-sa.yml", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 194, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'coredns', u'file': u'coredns-deployment.yml'}) => {"changed": false, "checksum": "953518d409de7d6a33a3e9a2b8bd91dfade89451", "dest": "/etc/kubernetes/coredns-deployment.yml", "gid": 0, "group": "root", "item": {"file": "coredns-deployment.yml", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 2979, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'svc', u'name': u'coredns', u'file': u'coredns-svc.yml'}) => {"changed": false, "checksum": "d94019ce7cc367047428d3d626c59a72c933512f", "dest": "/etc/kubernetes/coredns-svc.yml", "gid": 0, "group": "root", "item": {"file": "coredns-svc.yml", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 585, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'coredns', u'file': u'coredns-clusterrole.yml'}) => {"changed": false, "checksum": "638ee75cd21ffe8435b435a054e6ba0510173568", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrole.yml", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 379, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'coredns', u'file': u'coredns-clusterrolebinding.yml'}) => {"changed": false, "checksum": "a1e8fc4ad3d31c2e15ca75bfc42ce795b10e903b", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "coredns-clusterrolebinding.yml", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 445, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'sa', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-sa.yml'}) => {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-sa.yml", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrole', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-clusterrole.yml'}) => {"changed": false, "checksum": "ea4e2f28ad0490e19b1463a2072cff300e28063e", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrole.yml", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1142, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'clusterrolebinding', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler-clusterrolebinding.yml'}) => {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'deployment', u'name': u'dns-autoscaler', u'file': u'dns-autoscaler.yml'}) => {"changed": false, "checksum": "c5c21f7d2fe03ab570a0822fc45ce91efc042f39", "dest": "/etc/kubernetes/dns-autoscaler.yml", "gid": 0, "group": "root", "item": {"file": "dns-autoscaler.yml", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2480, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Secondary CoreDNS Template] ******************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:00 -0200 (0:00:06.000) 0:04:19.805 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down nodelocaldns Template] ************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.107) 0:04:19.913 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down KubeDNS Template] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.078) 0:04:19.992 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Patch system:kube-dns ClusterRole] ********************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.132) 0:04:20.125 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Resources] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:01 -0200 (0:00:00.056) 0:04:20.181 ******* | |
ok: [monstrinho] => (item=coredns-config.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "cf2b13b37cf3dae2789fb97755da2a649d3498fe", "dest": "/etc/kubernetes/coredns-config.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-config.yml"}, "before": {"path": "/etc/kubernetes/coredns-config.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-config.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-config.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-config.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-config.yml", "name": "coredns", "type": "configmap"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-config.yml", "size": 509, "state": "file", "uid": 0}, "msg": "success: configmap/coredns created"} | |
ok: [monstrinho] => (item=coredns-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "bbdff809c4fa8335354b4a1caf9e7de7d5873edc", "dest": "/etc/kubernetes/coredns-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-sa.yml"}, "before": {"path": "/etc/kubernetes/coredns-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-sa.yml", "name": "coredns", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-sa.yml", "size": 194, "state": "file", "uid": 0}, "msg": "success: serviceaccount/coredns unchanged"} | |
ok: [monstrinho] => (item=coredns-deployment.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "953518d409de7d6a33a3e9a2b8bd91dfade89451", "dest": "/etc/kubernetes/coredns-deployment.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-deployment.yml"}, "before": {"path": "/etc/kubernetes/coredns-deployment.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-deployment.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-deployment.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-deployment.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-deployment.yml", "name": "coredns", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-deployment.yml", "size": 2979, "state": "file", "uid": 0}, "msg": "success: deployment.extensions/coredns created"} | |
ok: [monstrinho] => (item=coredns-svc.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "d94019ce7cc367047428d3d626c59a72c933512f", "dest": "/etc/kubernetes/coredns-svc.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-svc.yml"}, "before": {"path": "/etc/kubernetes/coredns-svc.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-svc.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-svc.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-svc.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-svc.yml", "name": "coredns", "type": "svc"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-svc.yml", "size": 585, "state": "file", "uid": 0}, "msg": "success: service/coredns created"} | |
ok: [monstrinho] => (item=coredns-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "638ee75cd21ffe8435b435a054e6ba0510173568", "dest": "/etc/kubernetes/coredns-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrole.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrole.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrole.yml", "name": "coredns", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrole.yml", "size": 379, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:coredns unchanged"} | |
ok: [monstrinho] => (item=coredns-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "a1e8fc4ad3d31c2e15ca75bfc42ce795b10e903b", "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/coredns-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "coredns-clusterrolebinding.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/coredns-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "coredns-clusterrolebinding.yml", "name": "coredns", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/coredns-clusterrolebinding.yml", "size": 445, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:coredns unchanged"} | |
ok: [monstrinho] => (item=dns-autoscaler-sa.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "9d96dcf2256bb4968a45d09e9232666384e83f2e", "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-sa.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-sa.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-sa.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-sa.yml", "name": "dns-autoscaler", "type": "sa"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-sa.yml", "size": 763, "state": "file", "uid": 0}, "msg": "success: serviceaccount/dns-autoscaler unchanged"} | |
ok: [monstrinho] => (item=dns-autoscaler-clusterrole.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "ea4e2f28ad0490e19b1463a2072cff300e28063e", "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrole.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrole.yml", "name": "dns-autoscaler", "type": "clusterrole"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrole.yml", "size": 1142, "state": "file", "uid": 0}, "msg": "success: clusterrole.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"} | |
ok: [monstrinho] => (item=dns-autoscaler-clusterrolebinding.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "5c5b302e4cd73c2ec5ceb5262b2bd608173faccc", "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler-clusterrolebinding.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler-clusterrolebinding.yml", "name": "dns-autoscaler", "type": "clusterrolebinding"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler-clusterrolebinding.yml", "size": 959, "state": "file", "uid": 0}, "msg": "success: clusterrolebinding.rbac.authorization.k8s.io/system:dns-autoscaler unchanged"} | |
ok: [monstrinho] => (item=dns-autoscaler.yml) => {"attempts": 1, "changed": false, "item": {"changed": false, "checksum": "c5c21f7d2fe03ab570a0822fc45ce91efc042f39", "dest": "/etc/kubernetes/dns-autoscaler.yml", "diff": {"after": {"path": "/etc/kubernetes/dns-autoscaler.yml"}, "before": {"path": "/etc/kubernetes/dns-autoscaler.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dns-autoscaler.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dns-autoscaler.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dns-autoscaler.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dns-autoscaler.yml", "name": "dns-autoscaler", "type": "deployment"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dns-autoscaler.yml", "size": 2480, "state": "file", "uid": 0}, "msg": "success: deployment.apps/dns-autoscaler unchanged"} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Check if netchecker-server manifest already exists] **************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:05.218) 0:04:25.400 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Apply netchecker-server manifest to update annotations] ************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.062) 0:04:25.462 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Netchecker Templates list] ***************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.056) 0:04:25.518 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Append extra templates to Netchecker Templates list for PodSecurityPolicy] ***************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.053) 0:04:25.572 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay Down Netchecker Template] ************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.059) 0:04:25.632 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Purge old Netchecker server] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.056) 0:04:25.688 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start Netchecker Resources] **************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.053) 0:04:25.742 ******* | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Delete old kubernetes-dashboard resources] ************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:06 -0200 (0:00:00.058) 0:04:25.801 ******* | |
ok: [monstrinho] => (item=ClusterRoleBinding) => {"changed": false, "item": "ClusterRoleBinding", "msg": "success: "} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Lay down dashboard template] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:07 -0200 (0:00:00.528) 0:04:26.329 ******* | |
ok: [monstrinho] => (item={u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}) => {"changed": false, "checksum": "003dbd94894a7985004896023feb22e497979c2c", "dest": "/etc/kubernetes/dashboard.yml", "gid": 0, "group": "root", "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 5996, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/ansible : Kubernetes Apps | Start dashboard] *************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.712) 0:04:27.042 ******* | |
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/dashboard.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/dashboard.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/dashboard.yml'}, u'before': {u'path': u'/etc/kubernetes/dashboard.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, 'item': {u'type': u'deploy', u'name': u'kubernetes-dashboard', u'file': u'dashboard.yml'}, 'checksum': u'003dbd94894a7985004896023feb22e497979c2c', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0644', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/dashboard.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'dashboard.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/dashboard.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 5996, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "003dbd94894a7985004896023feb22e497979c2c", "dest": "/etc/kubernetes/dashboard.yml", "diff": {"after": {"path": "/etc/kubernetes/dashboard.yml"}, "before": {"path": "/etc/kubernetes/dashboard.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "dashboard.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/dashboard.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/dashboard.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "dashboard.yml", "name": "kubernetes-dashboard", "type": "deploy"}, "mode": "0644", "owner": "root", "path": "/etc/kubernetes/dashboard.yml", "size": 5996, "state": "file", "uid": 0}, "msg": "success: secret/kubernetes-dashboard-certs unchanged serviceaccount/kubernetes-dashboard unchanged role.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged rolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-minimal unchanged clusterrole.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous unchanged clusterrolebinding.rbac.authorization.k8s.io/kubernetes-dashboard-anonymous configured deployment.apps/kubernetes-dashboard unchanged service/kubernetes-dashboard unchanged"} | |
TASK [kubernetes-apps/helm : Helm | Make sure HELM_HOME directory exists] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.616) 0:04:27.658 ******* | |
TASK [kubernetes-apps/helm : Helm | Set up helm launcher] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.049) 0:04:27.708 ******* | |
TASK [kubernetes-apps/helm : Helm | Lay Down Helm Manifests (RBAC)] ************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.049) 0:04:27.757 ******* | |
TASK [kubernetes-apps/helm : Helm | Apply Helm Manifests (RBAC)] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:08 -0200 (0:00:00.068) 0:04:27.826 ******* | |
TASK [kubernetes-apps/helm : Helm | Set up TLS] ********************************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.070) 0:04:27.896 ******* | |
TASK [kubernetes-apps/helm : Helm | Install/upgrade helm] ************************************************************************************************************************************************************************************ | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:27.944 ******* | |
TASK [kubernetes-apps/helm : Helm | Force apply tiller overrides if necessary] *************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.052) 0:04:27.997 ******* | |
TASK [kubernetes-apps/helm : Helm | Set up bash completion] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.049 ******* | |
TASK [kubernetes-apps/registry : Registry | Create addon dir] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.050) 0:04:28.099 ******* | |
TASK [kubernetes-apps/registry : Registry | Templates list] ********************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.049) 0:04:28.148 ******* | |
TASK [kubernetes-apps/registry : Registry | Append extra templates to Registry Templates list for PodSecurityPolicy] ************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.063) 0:04:28.212 ******* | |
TASK [kubernetes-apps/registry : Registry | Create manifests] ******************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.264 ******* | |
TASK [kubernetes-apps/registry : Registry | Apply manifests] ********************************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.056) 0:04:28.321 ******* | |
TASK [kubernetes-apps/registry : Registry | Create PVC manifests] **************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.053) 0:04:28.374 ******* | |
TASK [kubernetes-apps/registry : Registry | Apply PVC manifests] ***************************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.053) 0:04:28.428 ******* | |
TASK [kubernetes-apps/metrics_server : Check all masters are node or not] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.062) 0:04:28.491 ******* | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Delete addon dir] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.060) 0:04:28.551 ******* | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Create addon dir] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.051) 0:04:28.603 ******* | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Templates list] ********************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.047) 0:04:28.650 ******* | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Create manifests] ******************************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:28.699 ******* | |
TASK [kubernetes-apps/metrics_server : Metrics Server | Apply manifests] ********************************************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.052) 0:04:28.751 ******* | |
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Lay down OpenStack Cinder Storage Class template] ******************************************************************************************************* | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.070) 0:04:28.822 ******* | |
TASK [kubernetes-apps/persistent_volumes/openstack : Kubernetes Persistent Volumes | Add OpenStack Cinder Storage Class] ********************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:09 -0200 (0:00:00.048) 0:04:28.870 ******* | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU| gather os specific variables] ****************************************************************************************************** | |
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.046) 0:04:28.916 ******* | |
ok: [monstrinho] => (item=/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml) => {"ansible_facts": {"nvidia_driver_install_container": "gcr.io/google-containers/ubuntu-nvidia-driver-installer@sha256:eea7309dc4fa4a5c9d716157e74b90826e0a853aa26c7219db4710ddcd1ad8bc", "nvidia_driver_install_supported": true}, "ansible_included_var_files": ["/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml"], "changed": false, "item": "/Users/yan/Documents/Projects/monstrinho/kubespray/roles/kubernetes-apps/container_engine_accelerator/nvidia_gpu/vars/ubuntu-18.yml"} | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url Tesla] *************************************************************************************************** | |
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.156) 0:04:29.073 ******* | |
ok: [monstrinho] => {"ansible_facts": {"nvidia_driver_download_url_default": "https://us.download.nvidia.com/tesla/390.87/NVIDIA-Linux-x86_64-390.87.run"}, "changed": false} | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Set fact of download url GTX] ***************************************************************************************************** | |
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.146) 0:04:29.219 ******* | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create addon dir] ***************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:10 -0200 (0:00:00.057) 0:04:29.277 ******* | |
changed: [monstrinho] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator", "size": 4, "state": "directory", "uid": 0} | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators] ***************************************************************************************** | |
Tuesday 29 January 2019 13:14:11 -0200 (0:00:00.618) 0:04:29.896 ******* | |
ok: [monstrinho] => (item={u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}) => {"changed": false, "checksum": "752e34d52f34865cbb566ebc2a2f3b9ffd8b210b", "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "gid": 0, "group": "root", "item": {"file": "nvidia-driver-install-daemonset.yml", "name": "nvidia-driver-install-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "size": 2525, "state": "file", "uid": 0} | |
ok: [monstrinho] => (item={u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}) => {"changed": false, "checksum": "a619924c0ad0c377b995b531776d94344c47ff95", "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "gid": 0, "group": "root", "item": {"file": "k8s-device-plugin-nvidia-daemonset.yml", "name": "k8s-device-plugin-nvidia-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "size": 1612, "state": "file", "uid": 0} | |
TASK [kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Apply manifests for nvidia accelerators] ****************************************************************************************** | |
Tuesday 29 January 2019 13:14:13 -0200 (0:00:02.224) 0:04:32.120 ******* | |
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml'}, u'before': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}, 'item': {u'type': u'daemonset', u'name': u'nvidia-driver-install-daemonset', u'file': u'nvidia-driver-install-daemonset.yml'}, 'checksum': u'752e34d52f34865cbb566ebc2a2f3b9ffd8b210b', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0755', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'nvidia-driver-install-daemonset.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 2525, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "752e34d52f34865cbb566ebc2a2f3b9ffd8b210b", "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml"}, "before": {"path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "nvidia-driver-install-daemonset.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "nvidia-driver-install-daemonset.yml", "name": "nvidia-driver-install-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/nvidia-driver-install-daemonset.yml", "size": 2525, "state": "file", "uid": 0}, "msg": "success: daemonset.extensions/nvidia-driver-installer configured"} | |
ok: [monstrinho] => (item={'_ansible_parsed': True, u'uid': 0, 'dest': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', '_ansible_item_result': True, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'owner': u'root', 'diff': {u'after': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml'}, u'before': {u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml'}}, '_ansible_no_log': False, u'group': u'root', '_ansible_item_label': {u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}, 'item': {u'type': u'daemonset', u'name': u'k8s-device-plugin-nvidia-daemonset', u'file': u'k8s-device-plugin-nvidia-daemonset.yml'}, 'checksum': u'a619924c0ad0c377b995b531776d94344c47ff95', u'changed': False, 'failed': False, u'state': u'file', u'gid': 0, u'mode': u'0755', u'invocation': {u'module_args': {u'directory_mode': None, u'force': False, u'remote_src': None, u'dest': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'access_time': None, u'access_time_format': u'%Y%m%d%H%M.%S', u'_original_basename': u'k8s-device-plugin-nvidia-daemonset.yml.j2', u'state': u'file', u'follow': False, u'owner': None, u'path': u'/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml', u'src': None, u'group': None, u'modification_time': None, u'unsafe_writes': None, u'delimiter': None, u'regexp': None, u'seuser': None, u'recurse': False, u'serole': None, u'_diff_peek': None, u'content': None, u'setype': None, u'mode': None, u'modification_time_format': u'%Y%m%d%H%M.%S', u'selevel': None, u'attributes': None, u'backup': None}}, u'size': 1612, '_ansible_ignore_errors': None}) => {"changed": false, "item": {"changed": false, "checksum": "a619924c0ad0c377b995b531776d94344c47ff95", "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "diff": {"after": {"path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml"}, "before": {"path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml"}}, "failed": false, "gid": 0, "group": "root", "invocation": {"module_args": {"_diff_peek": null, "_original_basename": "k8s-device-plugin-nvidia-daemonset.yml.j2", "access_time": null, "access_time_format": "%Y%m%d%H%M.%S", "attributes": null, "backup": null, "content": null, "delimiter": null, "dest": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "directory_mode": null, "follow": false, "force": false, "group": null, "mode": null, "modification_time": null, "modification_time_format": "%Y%m%d%H%M.%S", "owner": null, "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "recurse": false, "regexp": null, "remote_src": null, "selevel": null, "serole": null, "setype": null, "seuser": null, "src": null, "state": "file", "unsafe_writes": null}}, "item": {"file": "k8s-device-plugin-nvidia-daemonset.yml", "name": "k8s-device-plugin-nvidia-daemonset", "type": "daemonset"}, "mode": "0755", "owner": "root", "path": "/etc/kubernetes/addons/container_engine_accelerator/k8s-device-plugin-nvidia-daemonset.yml", "size": 1612, "state": "file", "uid": 0}, "msg": "success: daemonset.apps/nvidia-gpu-device-plugin unchanged"} | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_private_key] ************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:01.444) 0:04:33.565 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_region_id] *************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.056) 0:04:33.621 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_tenancy_id] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.053) 0:04:33.675 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_id] ***************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.055) 0:04:33.731 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_user_fingerprint] ******************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.051) 0:04:33.783 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_compartment_id] ********************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:14 -0200 (0:00:00.052) 0:04:33.836 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_vnc_id] ****************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.053) 0:04:33.889 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet1_id] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.050) 0:04:33.940 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_subnet2_id] ************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.064) 0:04:34.004 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Credentials Check | oci_security_list_management] ************************************************************************************************************************ | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.052) 0:04:34.056 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Generate Configuration] ************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.052) 0:04:34.108 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Encode Configuration] **************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.054) 0:04:34.163 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Configuration To Secret] ******************************************************************************************************************************************* | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.056) 0:04:34.219 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Configuration] ***************************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.056) 0:04:34.275 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Download Controller Manifest] ******************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.054) 0:04:34.330 ******* | |
TASK [kubernetes-apps/cloud_controller/oci : OCI Cloud Controller | Apply Controller Manifest] *********************************************************************************************************************************************** | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.053) 0:04:34.383 ******* | |
PLAY RECAP *********************************************************************************************************************************************************************************************************************************** | |
localhost : ok=1 changed=0 unreachable=0 failed=0 | |
monstrinho : ok=368 changed=37 unreachable=0 failed=0 | |
Tuesday 29 January 2019 13:14:15 -0200 (0:00:00.028) 0:04:34.412 ******* | |
=============================================================================== | |
download : container_download | download images for kubeadm config images ------------------------------------------------------------------------------------------------------------------------------------------------------------ 34.41s | |
kubernetes-apps/ansible : Kubernetes Apps | Lay Down CoreDNS Template ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 6.00s | |
network_plugin/calico : Calico | Copy cni plugins from calico/cni container ----------------------------------------------------------------------------------------------------------------------------------------------------------- 5.76s | |
kubernetes-apps/ansible : Kubernetes Apps | Start Resources --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 5.22s | |
network_plugin/calico : Calico | Create calico manifests ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 4.24s | |
download : container_download | Download containers if pull is required or told to always pull (all nodes) ---------------------------------------------------------------------------------------------------------------------------- 3.94s | |
kubernetes-apps/network_plugin/calico : Start Calico resources ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 3.69s | |
container-engine/docker : ensure docker packages are installed ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.75s | |
network_plugin/calico : Get current version of calico cluster version ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.62s | |
kubernetes-apps/ansible : Kubernetes Apps | Delete old nodelocalDNS resources --------------------------------------------------------------------------------------------------------------------------------------------------------- 2.60s | |
kubernetes/master : kubeadm | Remove taint for master with node role ------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.57s | |
network_plugin/calico : Calico | Set global as_num ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ 2.57s | |
network_plugin/calico : Calico | Check if calico network pool has already been configured --------------------------------------------------------------------------------------------------------------------------------------------- 2.51s | |
kubernetes/preinstall : Get current version of calico cluster version ----------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.51s | |
container-engine/docker : Ensure old versions of Docker are not installed. | Debian --------------------------------------------------------------------------------------------------------------------------------------------------- 2.26s | |
kubernetes-apps/container_engine_accelerator/nvidia_gpu : Container Engine Acceleration Nvidia GPU | Create manifests for nvidia accelerators ----------------------------------------------------------------------------------------- 2.22s | |
policy_controller/calico : Start of Calico kube controllers --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 2.17s | |
kubernetes/client : Generate admin kubeconfig with external api endpoint -------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.95s | |
policy_controller/calico : Create calico-kube-controllers manifests ------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.89s | |
network_plugin/calico : Calico | Copy cni plugins ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1.85s | |
~/D/P/m/kubespray ❯❯❯ master ✭ ◼ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment