Created
December 29, 2017 06:08
-
-
Save zhaohuabing/d4199b567baea8f6e61fb27e7fc071b5 to your computer and use it in GitHub Desktop.
ansible log for kubespray issue
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Using /home/ubuntu/kubespray/ansible.cfg as config file | |
PLAY [localhost] ************************************************************************************************************************************ | |
skipping: no hosts matched | |
PLAY [k8s-cluster:etcd:calico-rr] ******************************************************************************************************************* | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:47:56 +0000 (0:00:00.095) 0:00:00.095 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:47:56 +0000 (0:00:00.040) 0:00:00.135 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:47:56 +0000 (0:00:00.048) 0:00:00.183 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:47:56 +0000 (0:00:00.018) 0:00:00.202 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:47:56 +0000 (0:00:00.581) 0:00:00.784 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.618) 0:00:01.402 ******* | |
ok: [node3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.205) 0:00:01.608 ******* | |
TASK [bootstrap-os : Bootstrap | Install python 2.x and pip] **************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.070) 0:00:01.679 ******* | |
TASK [bootstrap-os : set_fact] ********************************************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.039) 0:00:01.718 ******* | |
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.038) 0:00:01.756 ******* | |
TASK [bootstrap-os : Bootstrap | Install python 2.x, pip, and dbus] ********************************************************************************* | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.064) 0:00:01.820 ******* | |
TASK [bootstrap-os : set_fact] ********************************************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.038) 0:00:01.859 ******* | |
TASK [bootstrap-os : Bootstrap | Check if bootstrap is needed] ************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.039) 0:00:01.898 ******* | |
TASK [bootstrap-os : Bootstrap | Run bootstrap.sh] ************************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.042) 0:00:01.940 ******* | |
TASK [bootstrap-os : set_fact] ********************************************************************************************************************** | |
Friday 29 December 2017 05:47:57 +0000 (0:00:00.046) 0:00:01.987 ******* | |
TASK [bootstrap-os : Bootstrap | Check if we need to install pip] *********************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.121) 0:00:02.109 ******* | |
TASK [bootstrap-os : Bootstrap | Copy get-pip.py] *************************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.040) 0:00:02.150 ******* | |
TASK [bootstrap-os : Bootstrap | Install pip] ******************************************************************************************************* | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.038) 0:00:02.188 ******* | |
TASK [bootstrap-os : Bootstrap | Remove get-pip.py] ************************************************************************************************* | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.037) 0:00:02.226 ******* | |
TASK [bootstrap-os : Bootstrap | Install pip launcher] ********************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.039) 0:00:02.266 ******* | |
TASK [bootstrap-os : Install required python modules] *********************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.302 ******* | |
TASK [bootstrap-os : Check presence of fastestmirror.conf] ****************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.060) 0:00:02.363 ******* | |
TASK [bootstrap-os : Disable fastestmirror plugin] ************************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.400 ******* | |
TASK [bootstrap-os : Install packages requirements for bootstrap] *********************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.437 ******* | |
TASK [bootstrap-os : Remove require tty] ************************************************************************************************************ | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.036) 0:00:02.474 ******* | |
ok: [node3] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
ok: [node1] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
ok: [node2] => {"backup": "", "changed": false, "found": 0, "msg": ""} | |
TASK [bootstrap-os : check if atomic host] ********************************************************************************************************** | |
Friday 29 December 2017 05:47:58 +0000 (0:00:00.333) 0:00:02.808 ******* | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
TASK [bootstrap-os : set_fact] ********************************************************************************************************************** | |
Friday 29 December 2017 05:47:59 +0000 (0:00:00.334) 0:00:03.142 ******* | |
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
TASK [bootstrap-os : Gather nodes hostnames] ******************************************************************************************************** | |
Friday 29 December 2017 05:47:59 +0000 (0:00:00.109) 0:00:03.252 ******* | |
ok: [node3] | |
ok: [node2] | |
ok: [node1] | |
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS)] ****************************************************************** | |
Friday 29 December 2017 05:47:59 +0000 (0:00:00.582) 0:00:03.834 ******* | |
ok: [node3] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node3.cluster.local", "ansible_hostname": "node3", "ansible_nodename": "node3"}, "changed": false, "name": "node3"} | |
ok: [node2] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node2.cluster.local", "ansible_hostname": "node2", "ansible_nodename": "node2"}, "changed": false, "name": "node2"} | |
ok: [node1] => {"ansible_facts": {"ansible_domain": "cluster.local", "ansible_fqdn": "node1.cluster.local", "ansible_hostname": "node1", "ansible_nodename": "node1"}, "changed": false, "name": "node1"} | |
TASK [bootstrap-os : Assign inventory name to unconfigured hostnames (CoreOS only)] ***************************************************************** | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.588) 0:00:04.423 ******* | |
TASK [bootstrap-os : Update hostname fact (CoreOS only)] ******************************************************************************************** | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.039) 0:00:04.462 ******* | |
PLAY [k8s-cluster:etcd:calico-rr] ******************************************************************************************************************* | |
PLAY [k8s-cluster:etcd:calico-rr] ******************************************************************************************************************* | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.105) 0:00:04.568 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.043) 0:00:04.611 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.042) 0:00:04.654 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:48:00 +0000 (0:00:00.021) 0:00:04.676 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:48:01 +0000 (0:00:00.502) 0:00:05.178 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:48:01 +0000 (0:00:00.542) 0:00:05.721 ******* | |
ok: [node2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] *********************************************************************************************************** | |
Friday 29 December 2017 05:48:01 +0000 (0:00:00.249) 0:00:05.970 ******* | |
ok: [node1] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true} | |
ok: [node2] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true} | |
ok: [node3] => {"changed": false, "gid": 999, "name": "kube-cert", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ***************************************************************************************************************** | |
Friday 29 December 2017 05:48:02 +0000 (0:00:00.410) 0:00:06.381 ******* | |
ok: [node3] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999} | |
ok: [node1] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999} | |
ok: [node2] => {"append": false, "changed": false, "comment": "Kubernetes user", "group": 999, "home": "/home/kube", "move_home": false, "name": "kube", "shell": "/sbin/nologin", "state": "present", "uid": 999} | |
TASK [kubernetes/preinstall : Stop if ansible version is too low] *********************************************************************************** | |
Friday 29 December 2017 05:48:02 +0000 (0:00:00.484) 0:00:06.866 ******* | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if non systemd OS type] ****************************************************************************************** | |
Friday 29 December 2017 05:48:02 +0000 (0:00:00.159) 0:00:07.025 ******* | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown OS] *************************************************************************************************** | |
Friday 29 December 2017 05:48:03 +0000 (0:00:00.255) 0:00:07.281 ******* | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if unknown network plugin] *************************************************************************************** | |
Friday 29 December 2017 05:48:03 +0000 (0:00:00.256) 0:00:07.537 ******* | |
TASK [kubernetes/preinstall : Stop if incompatible network plugin and cloudprovider] **************************************************************** | |
Friday 29 December 2017 05:48:03 +0000 (0:00:00.040) 0:00:07.577 ******* | |
TASK [kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }")] ****************************** | |
Friday 29 December 2017 05:48:03 +0000 (0:00:00.040) 0:00:07.617 ******* | |
ok: [node2] => (item={u'name': u'kubeadm_enabled', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "kubeadm_enabled", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'download_run_once', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "download_run_once", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'deploy_netchecker', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "deploy_netchecker", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'download_always_pull', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "download_always_pull", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'efk_enabled', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "efk_enabled", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'helm_enabled', u'value': True}) => { | |
"changed": false, | |
"item": { | |
"name": "helm_enabled", | |
"value": true | |
}, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => (item={u'name': u'openstack_lbaas_enabled', u'value': False}) => { | |
"changed": false, | |
"item": { | |
"name": "openstack_lbaas_enabled", | |
"value": false | |
}, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if even number of etcd hosts] ************************************************************************************ | |
Friday 29 December 2017 05:48:04 +0000 (0:00:00.790) 0:00:08.408 ******* | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if memory is too small for masters] ****************************************************************************** | |
Friday 29 December 2017 05:48:04 +0000 (0:00:00.259) 0:00:08.667 ******* | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if memory is too small for nodes] ******************************************************************************** | |
Friday 29 December 2017 05:48:04 +0000 (0:00:00.192) 0:00:08.860 ******* | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if ip var does not match local ips] ****************************************************************************** | |
Friday 29 December 2017 05:48:04 +0000 (0:00:00.203) 0:00:09.064 ******* | |
TASK [kubernetes/preinstall : Stop if access_ip is not pingable] ************************************************************************************ | |
Friday 29 December 2017 05:48:05 +0000 (0:00:00.040) 0:00:09.105 ******* | |
TASK [kubernetes/preinstall : Stop if swap enabled] ************************************************************************************************* | |
Friday 29 December 2017 05:48:05 +0000 (0:00:00.039) 0:00:09.144 ******* | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Stop if RBAC is not enabled when dashboard is enabled] **************************************************************** | |
Friday 29 December 2017 05:48:05 +0000 (0:00:00.274) 0:00:09.418 ******* | |
ok: [node3] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node2] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
ok: [node1] => { | |
"changed": false, | |
"msg": "All assertions passed" | |
} | |
TASK [kubernetes/preinstall : Force binaries directory for Container Linux by CoreOS] *************************************************************** | |
Friday 29 December 2017 05:48:05 +0000 (0:00:00.266) 0:00:09.685 ******* | |
TASK [kubernetes/preinstall : check bin dir exists] ************************************************************************************************* | |
Friday 29 December 2017 05:48:05 +0000 (0:00:00.042) 0:00:09.728 ******* | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes/preinstall : check if atomic host] ************************************************************************************************* | |
Friday 29 December 2017 05:48:06 +0000 (0:00:00.419) 0:00:10.147 ******* | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : set_fact] ************************************************************************************************************* | |
Friday 29 December 2017 05:48:06 +0000 (0:00:00.447) 0:00:10.595 ******* | |
ok: [node1] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"is_atomic": false}, "changed": false} | |
TASK [kubernetes/preinstall : set_fact] ************************************************************************************************************* | |
Friday 29 December 2017 05:48:06 +0000 (0:00:00.303) 0:00:10.899 ******* | |
TASK [kubernetes/preinstall : check resolvconf] ***************************************************************************************************** | |
Friday 29 December 2017 05:48:06 +0000 (0:00:00.058) 0:00:10.957 ******* | |
ok: [node2] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002003", "end": "2017-12-29 05:48:06.010111", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.008108", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]} | |
ok: [node1] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.002474", "end": "2017-12-29 05:48:06.036344", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:06.033870", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]} | |
ok: [node3] => {"changed": false, "cmd": "which resolvconf", "delta": "0:00:00.001865", "end": "2017-12-29 05:48:05.857209", "failed_when_result": false, "rc": 0, "start": "2017-12-29 05:48:05.855344", "stderr": "", "stderr_lines": [], "stdout": "/sbin/resolvconf", "stdout_lines": ["/sbin/resolvconf"]} | |
TASK [kubernetes/preinstall : set_fact] ************************************************************************************************************* | |
Friday 29 December 2017 05:48:07 +0000 (0:00:00.436) 0:00:11.393 ******* | |
ok: [node1] => {"ansible_facts": {"resolvconf": true}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"resolvconf": true}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"resolvconf": true}, "changed": false} | |
TASK [kubernetes/preinstall : set_fact] ************************************************************************************************************* | |
Friday 29 December 2017 05:48:07 +0000 (0:00:00.253) 0:00:11.647 ******* | |
ok: [node3] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"bogus_domains": "cluster.local.default.svc.cluster.local./default.svc.cluster.local.default.svc.cluster.local./com.default.svc.cluster.local./cluster.local.svc.cluster.local./svc.cluster.local.svc.cluster.local./com.svc.cluster.local./", "default_resolver": "8.8.8.8"}, "changed": false} | |
TASK [kubernetes/preinstall : check if kubelet is configured] *************************************************************************************** | |
Friday 29 December 2017 05:48:07 +0000 (0:00:00.297) 0:00:11.945 ******* | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : check if early DNS configuration stage] ******************************************************************************* | |
Friday 29 December 2017 05:48:08 +0000 (0:00:00.425) 0:00:12.370 ******* | |
ok: [node2] => {"ansible_facts": {"dns_early": true}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"dns_early": true}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"dns_early": true}, "changed": false} | |
TASK [kubernetes/preinstall : target resolv.conf files] ********************************************************************************************* | |
Friday 29 December 2017 05:48:08 +0000 (0:00:00.283) 0:00:12.654 ******* | |
ok: [node1] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"base": "/etc/resolvconf/resolv.conf.d/base", "head": "/etc/resolvconf/resolv.conf.d/head", "resolvconffile": "/etc/resolv.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : target temporary resolvconf cloud init file (Container Linux by CoreOS)] ********************************************** | |
Friday 29 December 2017 05:48:08 +0000 (0:00:00.304) 0:00:12.958 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhclient.conf exists] *********************************************************************************** | |
Friday 29 December 2017 05:48:08 +0000 (0:00:00.042) 0:00:13.001 ******* | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhclient.conf] ********************************************************************* | |
Friday 29 December 2017 05:48:09 +0000 (0:00:00.364) 0:00:13.366 ******* | |
TASK [kubernetes/preinstall : check if /etc/dhcp/dhclient.conf exists] ****************************************************************************** | |
Friday 29 December 2017 05:48:09 +0000 (0:00:00.041) 0:00:13.407 ******* | |
ok: [node1] => {"changed": false, "stat": {"atime": 1514447924.672, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [node2] => {"changed": false, "stat": {"atime": 1514447926.496, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [node3] => {"changed": false, "stat": {"atime": 1514447926.412, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "4ada2f1b00772234a6e7403712622489634510f2", "ctime": 1487946470.4271395, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 1244, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "c3b6c3271031ab8e250a192f4eb18695", "mimetype": "text/plain", "mode": "0644", "mtime": 1452709242.0, "nlink": 1, "path": "/etc/dhcp/dhclient.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1735, "uid": 0, "version": "18446744071791663259", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
TASK [kubernetes/preinstall : target dhclient conf file for /etc/dhcp/dhclient.conf] **************************************************************** | |
Friday 29 December 2017 05:48:09 +0000 (0:00:00.372) 0:00:13.780 ******* | |
ok: [node3] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"dhclientconffile": "/etc/dhcp/dhclient.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : target dhclient hook file for Red Hat family] ************************************************************************* | |
Friday 29 December 2017 05:48:09 +0000 (0:00:00.274) 0:00:14.055 ******* | |
TASK [kubernetes/preinstall : target dhclient hook file for Debian family] ************************************************************************** | |
Friday 29 December 2017 05:48:10 +0000 (0:00:00.043) 0:00:14.099 ******* | |
ok: [node3] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"dhclienthookfile": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate"}, "changed": false} | |
TASK [kubernetes/preinstall : generate search domains to resolvconf] ******************************************************************************** | |
Friday 29 December 2017 05:48:10 +0000 (0:00:00.269) 0:00:14.368 ******* | |
ok: [node2] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"domainentry": "domain cluster.local", "searchentries": "search default.svc.cluster.local svc.cluster.local", "supersede_domain": "supersede domain-name \"cluster.local\";", "supersede_search": "supersede domain-search \"default.svc.cluster.local\", \"svc.cluster.local\";"}, "changed": false} | |
TASK [kubernetes/preinstall : pick dnsmasq cluster IP or default resolver] ************************************************************************** | |
Friday 29 December 2017 05:48:10 +0000 (0:00:00.271) 0:00:14.640 ******* | |
ok: [node1] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"dnsmasq_server": []}, "changed": false} | |
TASK [kubernetes/preinstall : generate nameservers to resolvconf] *********************************************************************************** | |
Friday 29 December 2017 05:48:10 +0000 (0:00:00.275) 0:00:14.915 ******* | |
ok: [node2] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"nameserverentries": "nameserver 8.8.8.8", "supersede_nameserver": "supersede domain-name-servers 8.8.8.8;"}, "changed": false} | |
TASK [kubernetes/preinstall : gather os specific variables] ***************************************************************************************** | |
Friday 29 December 2017 05:48:11 +0000 (0:00:00.263) 0:00:15.179 ******* | |
ok: [node2] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"} | |
ok: [node1] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"} | |
ok: [node3] => (item=/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml) => {"ansible_facts": {"required_pkgs": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables"]}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/kubernetes/preinstall/vars/../vars/ubuntu.yml"} | |
TASK [kubernetes/preinstall : Create kubernetes directories] **************************************************************************************** | |
Friday 29 December 2017 05:48:11 +0000 (0:00:00.327) 0:00:15.507 ******* | |
ok: [node3] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/etc/kubernetes) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/etc/kubernetes/ssl) => {"changed": false, "gid": 999, "group": "kube-cert", "item": "/etc/kubernetes/ssl", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/etc/kubernetes/manifests) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/kubernetes/manifests", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes/manifests", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/usr/local/bin/kubernetes-scripts) => {"changed": false, "gid": 0, "group": "root", "item": "/usr/local/bin/kubernetes-scripts", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/mnt/disks) => {"changed": false, "gid": 0, "group": "root", "item": "/mnt/disks", "mode": "0755", "owner": "kube", "path": "/mnt/disks", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/preinstall : check cloud_provider value] ******************************************************************************************* | |
Friday 29 December 2017 05:48:12 +0000 (0:00:01.369) 0:00:16.876 ******* | |
TASK [kubernetes/preinstall : include] ************************************************************************************************************** | |
Friday 29 December 2017 05:48:12 +0000 (0:00:00.039) 0:00:16.915 ******* | |
TASK [kubernetes/preinstall : Create cni directories] *********************************************************************************************** | |
Friday 29 December 2017 05:48:12 +0000 (0:00:00.039) 0:00:16.954 ******* | |
ok: [node3] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/etc/cni/net.d) => {"changed": false, "gid": 0, "group": "root", "item": "/etc/cni/net.d", "mode": "0755", "owner": "kube", "path": "/etc/cni/net.d", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => (item=/opt/cni/bin) => {"changed": false, "gid": 0, "group": "root", "item": "/opt/cni/bin", "mode": "0755", "owner": "kube", "path": "/opt/cni/bin", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/preinstall : create temporary resolveconf cloud init file] ************************************************************************* | |
Friday 29 December 2017 05:48:13 +0000 (0:00:00.623) 0:00:17.578 ******* | |
TASK [kubernetes/preinstall : Add domain/search/nameservers/options to resolv.conf] ***************************************************************** | |
Friday 29 December 2017 05:48:13 +0000 (0:00:00.045) 0:00:17.624 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options before block] ***************************************************************** | |
Friday 29 December 2017 05:48:13 +0000 (0:00:00.040) 0:00:17.664 ******* | |
TASK [kubernetes/preinstall : Remove search/domain/nameserver options after block] ****************************************************************** | |
Friday 29 December 2017 05:48:13 +0000 (0:00:00.229) 0:00:17.894 ******* | |
TASK [kubernetes/preinstall : get temporary resolveconf cloud init file content] ******************************************************************** | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.227) 0:00:18.122 ******* | |
TASK [kubernetes/preinstall : persist resolvconf cloud init file] *********************************************************************************** | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.042) 0:00:18.164 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM)] ******************************************************************************** | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.041) 0:00:18.206 ******* | |
TASK [kubernetes/preinstall : Expire management cache (YUM) for Updation - Redhat] ****************************************************************** | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.038) 0:00:18.245 ******* | |
TASK [kubernetes/preinstall : Update package management cache (YUM) - Redhat] *********************************************************************** | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.038) 0:00:18.284 ******* | |
TASK [kubernetes/preinstall : Install latest version of python-apt for Debian distribs] ************************************************************* | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.036) 0:00:18.320 ******* | |
ok: [node3] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false} | |
ok: [node2] => {"cache_update_time": 1514525141, "cache_updated": false, "changed": false} | |
ok: [node1] => {"cache_update_time": 1514525140, "cache_updated": false, "changed": false} | |
TASK [kubernetes/preinstall : Install python-dnf for latest RedHat versions] ************************************************************************ | |
Friday 29 December 2017 05:48:14 +0000 (0:00:00.730) 0:00:19.051 ******* | |
TASK [kubernetes/preinstall : Install epel-release on RedHat/CentOS] ******************************************************************************** | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.039) 0:00:19.090 ******* | |
TASK [kubernetes/preinstall : Install packages requirements] **************************************************************************************** | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.036) 0:00:19.127 ******* | |
ok: [node3] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]} | |
ok: [node2] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]} | |
ok: [node1] => (item=[u'python-apt', u'aufs-tools', u'apt-transport-https', u'software-properties-common', u'ebtables', u'python-httplib2', u'openssl', u'curl', u'rsync', u'bash-completion', u'socat', u'unzip']) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": ["python-apt", "aufs-tools", "apt-transport-https", "software-properties-common", "ebtables", "python-httplib2", "openssl", "curl", "rsync", "bash-completion", "socat", "unzip"]} | |
TASK [kubernetes/preinstall : Confirm selinux deployed] ********************************************************************************************* | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.662) 0:00:19.789 ******* | |
TASK [kubernetes/preinstall : Set selinux policy] *************************************************************************************************** | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.039) 0:00:19.829 ******* | |
TASK [kubernetes/preinstall : Disable IPv6 DNS lookup] ********************************************************************************************** | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.037) 0:00:19.866 ******* | |
TASK [kubernetes/preinstall : set default sysctl file path] ***************************************************************************************** | |
Friday 29 December 2017 05:48:15 +0000 (0:00:00.034) 0:00:19.901 ******* | |
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.d/99-sysctl.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : Stat sysctl file configuration] *************************************************************************************** | |
Friday 29 December 2017 05:48:16 +0000 (0:00:00.272) 0:00:20.174 ******* | |
ok: [node2] => {"changed": false, "stat": {"atime": 1514459619.172, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448132.296, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
ok: [node3] => {"changed": false, "stat": {"atime": 1514459618.796, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448161.348, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
ok: [node1] => {"changed": false, "stat": {"atime": 1514459619.224, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 0, "charset": "binary", "ctime": 1514448124.792, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 29239, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": true, "isreg": false, "issock": false, "isuid": false, "lnk_source": "/etc/sysctl.conf", "lnk_target": "../sysctl.conf", "mimetype": "inode/symlink", "mode": "0777", "mtime": 1509099119.0, "nlink": 1, "path": "/etc/sysctl.d/99-sysctl.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14, "uid": 0, "version": null, "wgrp": true, "woth": true, "writeable": true, "wusr": true, "xgrp": true, "xoth": true, "xusr": true}} | |
TASK [kubernetes/preinstall : Change sysctl file path to link source if linked] ********************************************************************* | |
Friday 29 December 2017 05:48:16 +0000 (0:00:00.373) 0:00:20.547 ******* | |
ok: [node3] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"sysctl_file_path": "/etc/sysctl.conf"}, "changed": false} | |
TASK [kubernetes/preinstall : Enable ip forwarding] ************************************************************************************************* | |
Friday 29 December 2017 05:48:16 +0000 (0:00:00.276) 0:00:20.823 ******* | |
ok: [node3] => {"changed": false} | |
ok: [node2] => {"changed": false} | |
ok: [node1] => {"changed": false} | |
TASK [kubernetes/preinstall : Write cloud-config] *************************************************************************************************** | |
Friday 29 December 2017 05:48:17 +0000 (0:00:00.488) 0:00:21.312 ******* | |
TASK [kubernetes/preinstall : Hosts | populate inventory into hosts file] *************************************************************************** | |
Friday 29 December 2017 05:48:17 +0000 (0:00:00.040) 0:00:21.353 ******* | |
ok: [node3] => {"changed": false, "msg": ""} | |
ok: [node2] => {"changed": false, "msg": ""} | |
ok: [node1] => {"changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Hosts | populate kubernetes loadbalancer address into hosts file] ***************************************************** | |
Friday 29 December 2017 05:48:17 +0000 (0:00:00.512) 0:00:21.865 ******* | |
TASK [kubernetes/preinstall : Hosts | localhost ipv4 in hosts file] ********************************************************************************* | |
Friday 29 December 2017 05:48:17 +0000 (0:00:00.040) 0:00:21.906 ******* | |
ok: [node1] => {"backup": "", "changed": false, "msg": ""} | |
ok: [node2] => {"backup": "", "changed": false, "msg": ""} | |
ok: [node3] => {"backup": "", "changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Hosts | localhost ipv6 in hosts file] ********************************************************************************* | |
Friday 29 December 2017 05:48:18 +0000 (0:00:00.363) 0:00:22.269 ******* | |
ok: [node3] => {"backup": "", "changed": false, "msg": ""} | |
ok: [node1] => {"backup": "", "changed": false, "msg": ""} | |
ok: [node2] => {"backup": "", "changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Configure dhclient to supersede search/domain/nameservers] ************************************************************ | |
Friday 29 December 2017 05:48:18 +0000 (0:00:00.377) 0:00:22.646 ******* | |
TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (non-RH)] ********************************************************************* | |
Friday 29 December 2017 05:48:18 +0000 (0:00:00.045) 0:00:22.692 ******* | |
TASK [kubernetes/preinstall : Configue dhclient hooks for resolv.conf (RH-only)] ******************************************************************** | |
Friday 29 December 2017 05:48:18 +0000 (0:00:00.040) 0:00:22.732 ******* | |
TASK [kubernetes/preinstall : Remove kubespray specific config from dhclient config] **************************************************************** | |
Friday 29 December 2017 05:48:18 +0000 (0:00:00.043) 0:00:22.776 ******* | |
ok: [node1] => {"changed": false, "msg": ""} | |
ok: [node2] => {"changed": false, "msg": ""} | |
ok: [node3] => {"changed": false, "msg": ""} | |
TASK [kubernetes/preinstall : Remove kubespray specific dhclient hook] ****************************************************************************** | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.382) 0:00:23.159 ******* | |
ok: [node1] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"} | |
ok: [node2] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"} | |
ok: [node3] => {"changed": false, "path": "/etc/dhcp/dhclient-exit-hooks.d/zdnsupdate", "state": "absent"} | |
TASK [kubernetes/preinstall : Check if we are running inside a Azure VM] **************************************************************************** | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.388) 0:00:23.547 ******* | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/preinstall : install growpart] ***************************************************************************************************** | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.370) 0:00:23.918 ******* | |
TASK [kubernetes/preinstall : check if growpart needs to be run] ************************************************************************************ | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.039) 0:00:23.957 ******* | |
TASK [kubernetes/preinstall : check fs type] ******************************************************************************************************** | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.039) 0:00:23.997 ******* | |
TASK [kubernetes/preinstall : run growpart] ********************************************************************************************************* | |
Friday 29 December 2017 05:48:19 +0000 (0:00:00.040) 0:00:24.037 ******* | |
TASK [kubernetes/preinstall : run xfs_growfs] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.041) 0:00:24.079 ******* | |
TASK [docker/docker-storage : docker-storage-setup | install git and make] ************************************************************************** | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.046) 0:00:24.125 ******* | |
TASK [docker/docker-storage : docker-storage-setup | docker-storage-setup sysconfig template] ******************************************************* | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.056) 0:00:24.182 ******* | |
TASK [docker/docker-storage : docker-storage-override-directory | docker service storage-setup override dir] **************************************** | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.041) 0:00:24.224 ******* | |
TASK [docker/docker-storage : docker-storage-override | docker service storage-setup override file] ************************************************* | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.038) 0:00:24.262 ******* | |
TASK [docker/docker-storage : docker-storage-setup | install and run container-storage-setup] ******************************************************* | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.040) 0:00:24.303 ******* | |
TASK [docker : gather os specific variables] ******************************************************************************************************** | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.040) 0:00:24.343 ******* | |
ok: [node3] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"} | |
ok: [node2] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"} | |
ok: [node1] => (item=/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml) => {"ansible_facts": {"docker_kernel_min_version": "3.10", "docker_package_info": {"pkg_mgr": "apt", "pkgs": [{"force": true, "name": "{{ docker_versioned_pkg[docker_version | string] }}"}]}, "docker_repo_info": {"pkg_repo": "apt_repository", "repos": ["deb {{ docker_apt_repo_base_url }} {{ ansible_distribution|lower }}-{{ ansible_distribution_release|lower }} main\n"]}, "docker_repo_key_info": {"pkg_key": "apt_key", "repo_keys": ["58118E89F3A912897C070ADBF76221572C52609D"], "url": "{{ docker_apt_repo_gpgkey }}"}, "docker_versioned_pkg": {"1.11": "docker-engine=1.11.1-0~{{ ansible_distribution_release|lower }}", "1.12": "docker-engine=1.12.6-0~ubuntu-{{ ansible_distribution_release|lower }}", "1.13": "docker-engine=1.13.1-0~ubuntu-{{ ansible_distribution_release|lower }}", "17.03": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "edge": "docker-engine=17.05.0~ce-0~ubuntu-{{ ansible_distribution_release|lower }}", "latest": "docker-engine", "stable": "docker-engine=17.03.1~ce-0~ubuntu-{{ ansible_distribution_release|lower }}"}}, "ansible_included_var_files": ["/home/ubuntu/kubespray/roles/docker/vars/ubuntu.yml"], "changed": false, "item": "/home/ubuntu/kubespray/roles/docker/vars/../vars/ubuntu.yml"} | |
TASK [docker : set dns server for docker] *********************************************************************************************************** | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.296) 0:00:24.640 ******* | |
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
TASK [docker : set base docker dns facts] *********************************************************************************************************** | |
Friday 29 December 2017 05:48:20 +0000 (0:00:00.322) 0:00:24.962 ******* | |
ok: [node2] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_options": ["ndots:2", "timeout:2", "attempts:2"], "docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
TASK [docker : add upstream dns servers (only when dnsmasq is not used)] **************************************************************************** | |
Friday 29 December 2017 05:48:21 +0000 (0:00:00.324) 0:00:25.286 ******* | |
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3"]}, "changed": false} | |
TASK [docker : add global searchdomains] ************************************************************************************************************ | |
Friday 29 December 2017 05:48:21 +0000 (0:00:00.314) 0:00:25.601 ******* | |
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local"]}, "changed": false} | |
TASK [docker : check system nameservers] ************************************************************************************************************ | |
Friday 29 December 2017 05:48:21 +0000 (0:00:00.308) 0:00:25.909 ******* | |
ok: [node3] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002842", "end": "2017-12-29 05:48:20.743502", "rc": 0, "start": "2017-12-29 05:48:20.740660", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]} | |
ok: [node2] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002365", "end": "2017-12-29 05:48:20.916484", "rc": 0, "start": "2017-12-29 05:48:20.914119", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]} | |
ok: [node1] => {"changed": false, "cmd": "grep \"^nameserver\" /etc/resolv.conf | sed 's/^nameserver\\s*//'", "delta": "0:00:00.002883", "end": "2017-12-29 05:48:21.013035", "rc": 0, "start": "2017-12-29 05:48:21.010152", "stderr": "", "stderr_lines": [], "stdout": "8.8.8.8\n8.8.4.4", "stdout_lines": ["8.8.8.8", "8.8.4.4"]} | |
TASK [docker : check system search domains] ********************************************************************************************************* | |
Friday 29 December 2017 05:48:22 +0000 (0:00:00.448) 0:00:26.358 ******* | |
ok: [node3] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.003266", "end": "2017-12-29 05:48:21.151184", "rc": 0, "start": "2017-12-29 05:48:21.147918", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]} | |
ok: [node2] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002844", "end": "2017-12-29 05:48:21.385837", "rc": 0, "start": "2017-12-29 05:48:21.382993", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]} | |
ok: [node1] => {"changed": false, "cmd": "grep \"^search\" /etc/resolv.conf | sed 's/^search\\s*//'", "delta": "0:00:00.002593", "end": "2017-12-29 05:48:21.451827", "rc": 0, "start": "2017-12-29 05:48:21.449234", "stderr": "", "stderr_lines": [], "stdout": "openstacklocal", "stdout_lines": ["openstacklocal"]} | |
TASK [docker : add system nameservers to docker options] ******************************************************************************************** | |
Friday 29 December 2017 05:48:22 +0000 (0:00:00.439) 0:00:26.797 ******* | |
ok: [node1] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"docker_dns_servers": ["10.233.0.3", "8.8.8.8", "8.8.4.4"]}, "changed": false} | |
TASK [docker : add system search domains to docker options] ***************************************************************************************** | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.326) 0:00:27.124 ******* | |
ok: [node2] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"docker_dns_search_domains": ["default.svc.cluster.local", "svc.cluster.local", "openstacklocal"]}, "changed": false} | |
TASK [docker : check number of nameservers] ********************************************************************************************************* | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.339) 0:00:27.464 ******* | |
TASK [docker : rtrim number of nameservers to 3] **************************************************************************************************** | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.043) 0:00:27.508 ******* | |
TASK [docker : check number of search domains] ****************************************************************************************************** | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.042) 0:00:27.551 ******* | |
TASK [docker : check length of search domains] ****************************************************************************************************** | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.042) 0:00:27.594 ******* | |
TASK [docker : check for minimum kernel version] **************************************************************************************************** | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.043) 0:00:27.637 ******* | |
TASK [docker : ensure docker repository public key is installed] ************************************************************************************ | |
Friday 29 December 2017 05:48:23 +0000 (0:00:00.039) 0:00:27.677 ******* | |
ok: [node3] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"} | |
ok: [node2] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"} | |
ok: [node1] => (item=58118E89F3A912897C070ADBF76221572C52609D) => {"attempts": 1, "changed": false, "item": "58118E89F3A912897C070ADBF76221572C52609D"} | |
TASK [docker : ensure docker repository is enabled] ************************************************************************************************* | |
Friday 29 December 2017 05:48:24 +0000 (0:00:00.685) 0:00:28.362 ******* | |
ok: [node3] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main | |
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"} | |
ok: [node2] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main | |
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"} | |
ok: [node1] => (item=deb https://apt.dockerproject.org/repo ubuntu-xenial main | |
) => {"changed": false, "item": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "repo": "deb https://apt.dockerproject.org/repo ubuntu-xenial main\n", "state": "present"} | |
TASK [docker : Configure docker repository on RedHat/CentOS] **************************************************************************************** | |
Friday 29 December 2017 05:48:24 +0000 (0:00:00.699) 0:00:29.061 ******* | |
TASK [docker : ensure docker packages are installed] ************************************************************************************************ | |
Friday 29 December 2017 05:48:25 +0000 (0:00:00.040) 0:00:29.102 ******* | |
ok: [node3] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}} | |
ok: [node2] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525141, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}} | |
ok: [node1] => (item={u'force': True, u'name': u'docker-engine=17.03.1~ce-0~ubuntu-xenial'}) => {"attempts": 1, "cache_update_time": 1514525140, "cache_updated": false, "changed": false, "item": {"force": true, "name": "docker-engine=17.03.1~ce-0~ubuntu-xenial"}} | |
TASK [docker : set fact for docker_version] ********************************************************************************************************* | |
Friday 29 December 2017 05:48:25 +0000 (0:00:00.697) 0:00:29.799 ******* | |
ok: [node1] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.014017", "end": "2017-12-29 05:48:24.793994", "rc": 0, "start": "2017-12-29 05:48:24.779977", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]} | |
ok: [node2] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.011415", "end": "2017-12-29 05:48:24.845708", "rc": 0, "start": "2017-12-29 05:48:24.834293", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]} | |
ok: [node3] => {"changed": false, "cmd": ["docker", "version", "-f", "{{.Client.Version}}"], "delta": "0:00:00.010490", "end": "2017-12-29 05:48:24.690459", "rc": 0, "start": "2017-12-29 05:48:24.679969", "stderr": "", "stderr_lines": [], "stdout": "17.03.1-ce", "stdout_lines": ["17.03.1-ce"]} | |
TASK [docker : check minimum docker version for docker_dns mode. You need at least docker version >= 1.12 for resolvconf_mode=docker_dns] *********** | |
Friday 29 December 2017 05:48:26 +0000 (0:00:00.426) 0:00:30.226 ******* | |
TASK [docker : Create docker service systemd directory if it doesn't exist] ************************************************************************* | |
Friday 29 December 2017 05:48:26 +0000 (0:00:00.041) 0:00:30.267 ******* | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/systemd/system/docker.service.d", "size": 4096, "state": "directory", "uid": 0} | |
TASK [docker : Write docker proxy drop-in] ********************************************************************************************************** | |
Friday 29 December 2017 05:48:26 +0000 (0:00:00.426) 0:00:30.693 ******* | |
TASK [docker : get systemd version] ***************************************************************************************************************** | |
Friday 29 December 2017 05:48:26 +0000 (0:00:00.041) 0:00:30.735 ******* | |
TASK [docker : Write docker.service systemd file] *************************************************************************************************** | |
Friday 29 December 2017 05:48:26 +0000 (0:00:00.043) 0:00:30.778 ******* | |
ok: [node3] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0} | |
ok: [node2] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0} | |
ok: [node1] => {"changed": false, "checksum": "860b79c32d9bf8a46a7167a7c7ee51cba9eb07e7", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service", "size": 591, "state": "file", "uid": 0} | |
TASK [docker : Write docker options systemd drop-in] ************************************************************************************************ | |
Friday 29 December 2017 05:48:27 +0000 (0:00:00.697) 0:00:31.475 ******* | |
ok: [node1] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0} | |
ok: [node3] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0} | |
ok: [node2] => {"changed": false, "checksum": "0ad16aa2e450ad8037a3c98c14a9c6aaf43be722", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-options.conf", "size": 158, "state": "file", "uid": 0} | |
TASK [docker : Write docker dns systemd drop-in] **************************************************************************************************** | |
Friday 29 December 2017 05:48:28 +0000 (0:00:00.692) 0:00:32.168 ******* | |
ok: [node3] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0} | |
ok: [node1] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0} | |
ok: [node2] => {"changed": false, "checksum": "184aebc82d8f32a930b94076bcb88307e73e5201", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/docker.service.d/docker-dns.conf", "size": 268, "state": "file", "uid": 0} | |
TASK [docker : ensure docker service is started and enabled] **************************************************************************************** | |
Friday 29 December 2017 05:48:28 +0000 (0:00:00.690) 0:00:32.858 ******* | |
ok: [node3] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11747813615", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:25 UTC", "ActiveExitTimestampMonotonic": "11745680614", "ActiveState": "active", "After": "sysinit.target systemd-journald.socket network.target docker.socket system.slice basic.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:26 UTC", "AssertTimestampMonotonic": "11746697034", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "131041520728", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ConditionTimestampMonotonic": "11746697034", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20828", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ExecMainStartTimestampMonotonic": "11746708168", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:26 UTC] ; stop_time=[n/a] ; pid=20828 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveEnterTimestampMonotonic": "11746694163", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "InactiveExitTimestampMonotonic": "11746708194", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20828", "MemoryAccounting": "no", "MemoryCurrent": "1844580352", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11747813615", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "21", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11747813614", "WatchdogUSec": "0"}} | |
ok: [node2] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11748379031", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11746238519", "ActiveState": "active", "After": "network.target basic.target system.slice sysinit.target docker.socket systemd-journald.socket", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11747252402", "Before": "multi-user.target shutdown.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "138815837592", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11747252401", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20784", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11747260177", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:14:27 UTC] ; stop_time=[n/a] ; pid=20784 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11747250465", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11747260211", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20784", "MemoryAccounting": "no", "MemoryCurrent": "1844490240", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "sysinit.target system.slice", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11748379031", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "22", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11748379030", "WatchdogUSec": "0"}} | |
ok: [node1] => (item=docker) => {"changed": false, "enabled": true, "item": "docker", "name": "docker", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:14:28 UTC", "ActiveEnterTimestampMonotonic": "11750578084", "ActiveExitTimestamp": "Thu 2017-12-28 11:14:26 UTC", "ActiveExitTimestampMonotonic": "11748443756", "ActiveState": "active", "After": "network.target systemd-journald.socket docker.socket basic.target system.slice sysinit.target", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:14:27 UTC", "AssertTimestampMonotonic": "11749460513", "Before": "etcd.service shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "147571016825", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ConditionTimestampMonotonic": "11749460513", "Conflicts": "shutdown.target", "ConsistsOf": "docker.socket", "ControlGroup": "/system.slice/docker.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "yes", "Description": "Docker Application Container Engine", "DevicePolicy": "auto", "Documentation": "http://docs.docker.com", "DropInPaths": "/etc/systemd/system/docker.service.d/docker-dns.conf /etc/systemd/system/docker.service.d/docker-options.conf", "Environment": "GOTRACEBACK=crash DOCKER_DNS_OPTIONS=\\x20\\x20\\x20\\x20\\x20--dns\\x2010.233.0.3\\x20--dns\\x208.8.8.8\\x20--dns\\x208.8.4.4\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-search\\x20default.svc.cluster.local\\x20--dns-search\\x20svc.cluster.local\\x20--dns-search\\x20openstacklocal\\x20\\x20\\x20\\x20\\x20\\x20\\x20--dns-opt\\x20ndots:2\\x20--dns-opt\\x20timeout:2\\x20--dns-opt\\x20attempts:2\\x20\\x20\\x20 DOCKER_OPTS=--insecure-registry=10.233.0.0/18\\x20--graph=/var/lib/docker\\x20\\x20--log-opt\\x20max-size=50m\\x20--log-opt\\x20max-file=5\\x20\\x20--iptables=false", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "20839", "ExecMainStartTimestamp": "Thu 2017-12-28 11:14:27 UTC", "ExecMainStartTimestampMonotonic": "11749472130", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -s HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/bin/dockerd ; argv[]=/usr/bin/dockerd $DOCKER_OPTS $DOCKER_STORAGE_OPTIONS $DOCKER_NETWORK_OPTIONS $DOCKER_DNS_OPTIONS $INSECURE_REGISTRY ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/docker.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "docker.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveEnterTimestampMonotonic": "11749458467", "InactiveExitTimestamp": "Thu 2017-12-28 11:14:27 UTC", "InactiveExitTimestampMonotonic": "11749472171", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "process", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "18446744073709551615", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "1048576", "LimitNOFILESoft": "1048576", "LimitNPROC": "1048576", "LimitNPROCSoft": "1048576", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "20839", "MemoryAccounting": "no", "MemoryCurrent": "1853849600", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "docker.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "main", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "no", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "on-abnormal", "RestartUSec": "100ms", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:14:28 UTC", "StateChangeTimestampMonotonic": "11750578084", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "33", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "1min", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "TriggeredBy": "docker.socket", "Type": "notify", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:14:28 UTC", "WatchdogTimestampMonotonic": "11750578083", "WatchdogUSec": "0"}} | |
TASK [rkt : gather os specific variables for rkt] *************************************************************************************************** | |
Friday 29 December 2017 05:48:29 +0000 (0:00:00.526) 0:00:33.385 ******* | |
TASK [rkt : install rkt pkg on ubuntu] ************************************************************************************************************** | |
Friday 29 December 2017 05:48:29 +0000 (0:00:00.052) 0:00:33.437 ******* | |
TASK [rkt : install rkt pkg on centos] ************************************************************************************************************** | |
Friday 29 December 2017 05:48:29 +0000 (0:00:00.044) 0:00:33.482 ******* | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:29 +0000 (0:00:00.040) 0:00:33.522 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:48:29 +0000 (0:00:00.375) 0:00:33.898 ******* | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000} | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000} | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "ubuntu", "path": "/tmp/releases/containers", "size": 4096, "state": "directory", "uid": 1000} | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:48:30 +0000 (0:00:00.423) 0:00:34.321 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:48:30 +0000 (0:00:00.021) 0:00:34.342 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_file.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
included: /home/ubuntu/kubespray/roles/download/tasks/download_container.yml for node2, node1, node3 | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:31 +0000 (0:00:01.228) 0:00:35.570 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:31 +0000 (0:00:00.146) 0:00:35.716 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:32 +0000 (0:00:00.472) 0:00:36.189 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/ctl:v1.6.1"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:32 +0000 (0:00:00.492) 0:00:36.682 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.426) 0:00:37.108 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.360) 0:00:37.469 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.065) 0:00:37.534 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.019) 0:00:37.554 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.068) 0:00:37.623 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:33 +0000 (0:00:00.147) 0:00:37.770 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:34 +0000 (0:00:00.346) 0:00:38.116 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/hyperkube:v1.9.0_coreos.0"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:34 +0000 (0:00:00.373) 0:00:38.490 ******* | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:34 +0000 (0:00:00.442) 0:00:38.933 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.348) 0:00:39.281 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.063) 0:00:39.345 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.019) 0:00:39.365 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.063) 0:00:39.429 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.141) 0:00:39.570 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:35 +0000 (0:00:00.337) 0:00:39.908 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/coreos/etcd:v3.2.4"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:36 +0000 (0:00:00.428) 0:00:40.337 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:36 +0000 (0:00:00.505) 0:00:40.842 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.433) 0:00:41.276 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.065) 0:00:41.341 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.021) 0:00:41.363 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.059) 0:00:41.422 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.141) 0:00:41.564 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:37 +0000 (0:00:00.359) 0:00:41.923 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/cluster-proportional-autoscaler-amd64:1.1.1"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:38 +0000 (0:00:00.374) 0:00:42.298 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:38 +0000 (0:00:00.442) 0:00:42.740 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.355) 0:00:43.095 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.062) 0:00:43.158 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.019) 0:00:43.178 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.068) 0:00:43.246 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.141) 0:00:43.387 ******* | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.337) 0:00:43.724 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/node:v2.6.2"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:39 +0000 (0:00:00.344) 0:00:44.068 ******* | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:40 +0000 (0:00:00.445) 0:00:44.514 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:40 +0000 (0:00:00.348) 0:00:44.862 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:40 +0000 (0:00:00.063) 0:00:44.926 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:40 +0000 (0:00:00.020) 0:00:44.947 ******* | |
TASK [download : file_download | Downloading...] **************************************************************************************************** | |
Friday 29 December 2017 05:48:40 +0000 (0:00:00.054) 0:00:45.001 ******* | |
ok: [node3] => { | |
"msg": [ | |
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", | |
"Dest: istio/istioctl" | |
] | |
} | |
ok: [node2] => { | |
"msg": [ | |
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", | |
"Dest: istio/istioctl" | |
] | |
} | |
ok: [node1] => { | |
"msg": [ | |
"URL: https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux", | |
"Dest: istio/istioctl" | |
] | |
} | |
TASK [download : file_download | Create dest directory] ********************************************************************************************* | |
Friday 29 December 2017 05:48:41 +0000 (0:00:00.351) 0:00:45.353 ******* | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/tmp/releases/istio", "size": 4096, "state": "directory", "uid": 0} | |
TASK [download : file_download | Download item] ***************************************************************************************************** | |
Friday 29 December 2017 05:48:41 +0000 (0:00:00.459) 0:00:45.812 ******* | |
ok: [node3] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"} | |
ok: [node2] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"} | |
ok: [node1] => {"attempts": 1, "changed": false, "dest": "/tmp/releases/istio/istioctl", "gid": 0, "group": "root", "mode": "0755", "msg": "file already exists", "owner": "root", "size": 38262799, "state": "file", "uid": 0, "url": "https://storage.googleapis.com/istio-release/releases/0.2.6/istioctl/istioctl-linux"} | |
TASK [download : file_download | Extract archives] ************************************************************************************************** | |
Friday 29 December 2017 05:48:42 +0000 (0:00:00.729) 0:00:46.542 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:42 +0000 (0:00:00.061) 0:00:46.604 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:42 +0000 (0:00:00.144) 0:00:46.748 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:43 +0000 (0:00:00.337) 0:00:47.086 ******* | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/pause-amd64:3.0"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:43 +0000 (0:00:00.340) 0:00:47.427 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:43 +0000 (0:00:00.427) 0:00:47.854 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.351) 0:00:48.205 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.066) 0:00:48.272 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.020) 0:00:48.293 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.068) 0:00:48.361 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.146) 0:00:48.508 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:44 +0000 (0:00:00.368) 0:00:48.877 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "nginx:1.13"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:45 +0000 (0:00:00.352) 0:00:49.230 ******* | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:45 +0000 (0:00:00.441) 0:00:49.671 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:45 +0000 (0:00:00.348) 0:00:50.019 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.065) 0:00:50.085 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.019) 0:00:50.104 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.061) 0:00:50.166 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.146) 0:00:50.313 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.344) 0:00:50.657 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "lachlanevenson/k8s-helm:v2.7.2"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:46 +0000 (0:00:00.338) 0:00:50.996 ******* | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.429) 0:00:51.425 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.359) 0:00:51.784 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.063) 0:00:51.848 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.019) 0:00:51.868 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.060) 0:00:51.928 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:47 +0000 (0:00:00.143) 0:00:52.072 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:48 +0000 (0:00:00.359) 0:00:52.432 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/kubernetes-helm/tiller:v2.7.2"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:48 +0000 (0:00:00.353) 0:00:52.786 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.429) 0:00:53.215 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.351) 0:00:53.567 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.064) 0:00:53.631 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.019) 0:00:53.651 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.060) 0:00:53.712 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:49 +0000 (0:00:00.142) 0:00:53.854 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:50 +0000 (0:00:00.348) 0:00:54.203 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64:1.14.7"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:50 +0000 (0:00:00.349) 0:00:54.553 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.536) 0:00:55.089 ******* | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.445) 0:00:55.535 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.064) 0:00:55.599 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.020) 0:00:55.619 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.059) 0:00:55.679 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:51 +0000 (0:00:00.140) 0:00:55.820 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:52 +0000 (0:00:00.509) 0:00:56.329 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/cni:v1.11.0"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:52 +0000 (0:00:00.522) 0:00:56.851 ******* | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:53 +0000 (0:00:00.459) 0:00:57.311 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:53 +0000 (0:00:00.500) 0:00:57.812 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:53 +0000 (0:00:00.067) 0:00:57.879 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:53 +0000 (0:00:00.021) 0:00:57.901 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:53 +0000 (0:00:00.068) 0:00:57.969 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:54 +0000 (0:00:00.144) 0:00:58.114 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:54 +0000 (0:00:00.360) 0:00:58.474 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-sidecar-amd64:1.14.7"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:54 +0000 (0:00:00.515) 0:00:58.990 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:55 +0000 (0:00:00.576) 0:00:59.567 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:55 +0000 (0:00:00.486) 0:01:00.053 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:56 +0000 (0:00:00.067) 0:01:00.120 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:56 +0000 (0:00:00.022) 0:01:00.143 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:56 +0000 (0:00:00.060) 0:01:00.203 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:56 +0000 (0:00:00.152) 0:01:00.355 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:56 +0000 (0:00:00.518) 0:01:00.874 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "quay.io/calico/routereflector:v0.4.0"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:57 +0000 (0:00:00.507) 0:01:01.382 ******* | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:57 +0000 (0:00:00.580) 0:01:01.963 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:48:58 +0000 (0:00:00.515) 0:01:02.479 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:48:58 +0000 (0:00:00.065) 0:01:02.544 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:48:58 +0000 (0:00:00.019) 0:01:02.564 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:48:58 +0000 (0:00:00.063) 0:01:02.627 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:58 +0000 (0:00:00.150) 0:01:02.777 ******* | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:48:59 +0000 (0:00:00.548) 0:01:03.326 ******* | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false} | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "busybox:latest"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:48:59 +0000 (0:00:00.380) 0:01:03.707 ******* | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.439) 0:01:04.147 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.367) 0:01:04.514 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.066) 0:01:04.581 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.020) 0:01:04.602 ******* | |
TASK [download : container_download | Make download decision if pull is required by tag or sha256] ************************************************** | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.065) 0:01:04.668 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/set_docker_image_facts.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:49:00 +0000 (0:00:00.145) 0:01:04.813 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_by_digest": false}, "changed": false} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:49:01 +0000 (0:00:00.375) 0:01:05.189 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_args": "gcr.io/google_containers/k8s-dns-kube-dns-amd64:1.14.7"}, "changed": false} | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:01 +0000 (0:00:00.346) 0:01:05.535 ******* | |
ok: [node1] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node2] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
ok: [node3] => {"censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result"} | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:49:01 +0000 (0:00:00.442) 0:01:05.978 ******* | |
ok: [node1 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node2 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
ok: [node3 -> None] => {"ansible_facts": {"pull_required": false}, "changed": false} | |
TASK [download : Check the local digest sha256 corresponds to the given image tag] ****************************************************************** | |
Friday 29 December 2017 05:49:02 +0000 (0:00:00.398) 0:01:06.376 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (delegate)] ************************************ | |
Friday 29 December 2017 05:49:02 +0000 (0:00:00.067) 0:01:06.444 ******* | |
TASK [download : container_download | Download containers if pull is required or told to always pull (all nodes)] *********************************** | |
Friday 29 December 2017 05:49:02 +0000 (0:00:00.024) 0:01:06.468 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:02 +0000 (0:00:00.052) 0:01:06.520 ******* | |
included: /home/ubuntu/kubespray/roles/download/tasks/sync_container.yml for node2, node3, node1 | |
TASK [download : set_fact] ************************************************************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.816) 0:01:07.336 ******* | |
TASK [download : container_download | Set default value for 'container_changed' to false] *********************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.027) 0:01:07.364 ******* | |
TASK [download : container_download | Update the 'container_changed' fact] ************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.051) 0:01:07.415 ******* | |
TASK [download : container_download | Stat saved container image] *********************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.056) 0:01:07.471 ******* | |
TASK [download : container_download | save container images] **************************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.036) 0:01:07.508 ******* | |
TASK [download : container_download | copy container images to ansible host] ************************************************************************ | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.030) 0:01:07.539 ******* | |
TASK [download : container_download | upload container images to nodes] ***************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.030) 0:01:07.569 ******* | |
TASK [download : container_download | load container images] **************************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.056) 0:01:07.626 ******* | |
PLAY [etcd:k8s-cluster:vault:calico-rr] ************************************************************************************************************* | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.188) 0:01:07.814 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.046) 0:01:07.861 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.044) 0:01:07.905 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:03 +0000 (0:00:00.020) 0:01:07.925 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:04 +0000 (0:00:00.553) 0:01:08.478 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:04 +0000 (0:00:00.536) 0:01:09.015 ******* | |
TASK [adduser : User | Create User Group] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:04 +0000 (0:00:00.044) 0:01:09.059 ******* | |
TASK [adduser : User | Create User] ***************************************************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.042) 0:01:09.101 ******* | |
TASK [vault : stop vault-temp container] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.148 ******* | |
TASK [vault : check_vault | Attempt to pull local https Vault health] ******************************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.041) 0:01:09.190 ******* | |
TASK [vault : check_vault | Set facts about local Vault health] ************************************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.236 ******* | |
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] **************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.045) 0:01:09.282 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.024) 0:01:09.306 ******* | |
TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] ************************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.069) 0:01:09.376 ******* | |
TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] ************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.037) 0:01:09.413 ******* | |
TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] ***************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.047) 0:01:09.461 ******* | |
TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] **************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.022) 0:01:09.483 ******* | |
TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] *************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.043) 0:01:09.526 ******* | |
TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************ | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.046) 0:01:09.573 ******* | |
TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] ************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.617 ******* | |
TASK [vault : find_leader | Find the current http Vault leader] ************************************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.045) 0:01:09.662 ******* | |
TASK [vault : find_leader | Set fact for current http leader] *************************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.041) 0:01:09.704 ******* | |
TASK [vault : find_leader| show vault_leader_url] *************************************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.054) 0:01:09.758 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.803 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.049) 0:01:09.853 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.044) 0:01:09.898 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.047) 0:01:09.945 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.064) 0:01:10.010 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:05 +0000 (0:00:00.050) 0:01:10.061 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.114 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.063) 0:01:10.177 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.057) 0:01:10.235 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.074) 0:01:10.309 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.060) 0:01:10.370 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.070) 0:01:10.441 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.495 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.061) 0:01:10.557 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.066) 0:01:10.623 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.066) 0:01:10.690 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.053) 0:01:10.744 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.048) 0:01:10.792 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.051) 0:01:10.844 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.075) 0:01:10.919 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.063) 0:01:10.983 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] ******************************************************************* | |
Friday 29 December 2017 05:49:06 +0000 (0:00:00.061) 0:01:11.044 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] *************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.057) 0:01:11.102 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.054) 0:01:11.157 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.049) 0:01:11.206 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.253 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.051) 0:01:11.304 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.049) 0:01:11.354 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.402 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.050) 0:01:11.452 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.052) 0:01:11.504 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.044) 0:01:11.549 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.045) 0:01:11.594 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.047) 0:01:11.641 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.046) 0:01:11.688 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.045) 0:01:11.733 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.050) 0:01:11.784 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.046) 0:01:11.831 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.063) 0:01:11.895 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.048) 0:01:11.943 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:07 +0000 (0:00:00.069) 0:01:12.013 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.063) 0:01:12.076 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.052) 0:01:12.129 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.177 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ****************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.222 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] ************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.041) 0:01:12.264 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.043) 0:01:12.307 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.354 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.048) 0:01:12.403 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.449 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.045) 0:01:12.495 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.052) 0:01:12.548 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.068) 0:01:12.616 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.085) 0:01:12.701 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:12.748 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.046) 0:01:12.795 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.049) 0:01:12.844 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.053) 0:01:12.897 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.044) 0:01:12.942 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.048) 0:01:12.990 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:08 +0000 (0:00:00.047) 0:01:13.038 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.049) 0:01:13.087 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.134 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.051) 0:01:13.185 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.048) 0:01:13.233 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.055) 0:01:13.289 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.050) 0:01:13.339 ******* | |
TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] ********************************************************************* | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.045) 0:01:13.385 ******* | |
TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] **************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.041) 0:01:13.427 ******* | |
TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] ***************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.044) 0:01:13.471 ******* | |
TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] *************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.517 ******* | |
TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] ********************************************************* | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.563 ******* | |
TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] *********************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.046) 0:01:13.609 ******* | |
TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] ********************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.045) 0:01:13.655 ******* | |
TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] *************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.048) 0:01:13.704 ******* | |
TASK [vault : vault | Set fact about vault leader url] ********************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.036) 0:01:13.741 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.043) 0:01:13.784 ******* | |
TASK [vault : shared/auth_backend | Test if the auth backend exists] ******************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.060) 0:01:13.845 ******* | |
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] **************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.043) 0:01:13.889 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.042) 0:01:13.932 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] ***************************************************************************** | |
Friday 29 December 2017 05:49:09 +0000 (0:00:00.100) 0:01:14.033 ******* | |
TASK [vault : bootstrap/gen_ca | Generate vault root CA] ******************************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.059) 0:01:14.093 ******* | |
TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] *********************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.033) 0:01:14.126 ******* | |
TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.055) 0:01:14.182 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] ************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.057) 0:01:14.239 ******* | |
TASK [vault : bootstrap/gen_ca | Generate etcd root CA] ********************************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.060) 0:01:14.300 ******* | |
TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.035) 0:01:14.336 ******* | |
TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] ************************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.057) 0:01:14.393 ******* | |
TASK [vault : issue_cert | Ensure target directory exists] ****************************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.043) 0:01:14.436 ******* | |
TASK [vault : issue_cert | Read in the local credentials] ******************************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.051) 0:01:14.488 ******* | |
TASK [vault : gen_certs_vault | Set facts for read Vault Creds] ************************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.027) 0:01:14.515 ******* | |
TASK [vault : gen_certs_vault | Log into Vault and obtain an token] ********************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.025) 0:01:14.541 ******* | |
TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************ | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.022) 0:01:14.563 ******* | |
TASK [vault : gen_certs_vault | Set fact for Vault API token] *************************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.023) 0:01:14.587 ******* | |
TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] ************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.039) 0:01:14.627 ******* | |
TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] *************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.026) 0:01:14.653 ******* | |
TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************ | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.048) 0:01:14.701 ******* | |
TASK [vault : issue_cert | Copy issuing CA cert] **************************************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.048) 0:01:14.750 ******* | |
TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************ | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.049) 0:01:14.800 ******* | |
TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] ******************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.054) 0:01:14.854 ******* | |
TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ******************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.058) 0:01:14.913 ******* | |
TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] **************************************************************************************** | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.043) 0:01:14.956 ******* | |
TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] ******************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.045) 0:01:15.001 ******* | |
TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] ********************************************************************************* | |
Friday 29 December 2017 05:49:10 +0000 (0:00:00.044) 0:01:15.046 ******* | |
TASK [vault : stop vault-temp container] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.042) 0:01:15.089 ******* | |
TASK [vault : check_vault | Attempt to pull local https Vault health] ******************************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.049) 0:01:15.139 ******* | |
TASK [vault : check_vault | Set facts about local Vault health] ************************************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.042) 0:01:15.181 ******* | |
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] **************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.227 ******* | |
TASK [vault : check_etcd | Check if etcd is up and reachable] *************************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.030) 0:01:15.257 ******* | |
TASK [vault : check_etcd | Set fact based off the etcd_health_check response] *********************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.021) 0:01:15.279 ******* | |
TASK [vault : set_fact] ***************************************************************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.057) 0:01:15.337 ******* | |
TASK [vault : check_etcd | Fail if etcd is not available and needed] ******************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.049) 0:01:15.387 ******* | |
TASK [vault : cluster/configure | Ensure the vault/config directory exists] ************************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.078) 0:01:15.465 ******* | |
TASK [vault : cluster/configure | Lay down the configuration file] ********************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.047) 0:01:15.512 ******* | |
TASK [vault : cluster/binary | Copy vault binary from downloaddir] ********************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.559 ******* | |
TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] *********************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.048) 0:01:15.608 ******* | |
TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] ************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.110) 0:01:15.718 ******* | |
TASK [vault : cluster/systemd | Copy down vault.service systemd file] ******************************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.081) 0:01:15.799 ******* | |
TASK [vault : Create vault service systemd directory] *********************************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.044) 0:01:15.844 ******* | |
TASK [vault : cluster/systemd | Add vault proxy env vars] ******************************************************************************************* | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.041) 0:01:15.885 ******* | |
TASK [vault : cluster/systemd | Enable vault.service] *********************************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.051) 0:01:15.936 ******* | |
TASK [vault : cluster/systemd | Query local vault until service is up] ****************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.046) 0:01:15.983 ******* | |
TASK [vault : cluster/init | Initialize Vault] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.044) 0:01:16.027 ******* | |
TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************ | |
Friday 29 December 2017 05:49:11 +0000 (0:00:00.041) 0:01:16.069 ******* | |
TASK [vault : cluster/init | Ensure all hosts have these facts] ************************************************************************************* | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.114 ******* | |
TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] *********************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.042) 0:01:16.156 ******* | |
TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] *************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.046) 0:01:16.202 ******* | |
TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] **************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.042) 0:01:16.245 ******* | |
TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] ******************************************************************* | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.048) 0:01:16.293 ******* | |
TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************ | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.337 ******* | |
TASK [vault : cluster/unseal | Unseal Vault] ******************************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.050) 0:01:16.388 ******* | |
TASK [vault : cluster/unseal | Wait until server is ready] ****************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.038) 0:01:16.426 ******* | |
TASK [vault : find_leader | Find the current http Vault leader] ************************************************************************************* | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:16.470 ******* | |
TASK [vault : find_leader | Set fact for current http leader] *************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.047) 0:01:16.518 ******* | |
TASK [vault : find_leader| show vault_leader_url] *************************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.563 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.046) 0:01:16.610 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************ | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.131) 0:01:16.741 ******* | |
TASK [vault : bootstrap/gen_ca | Generate kube root CA] ********************************************************************************************* | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.060) 0:01:16.802 ******* | |
TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.034) 0:01:16.836 ******* | |
TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] ************************************************************************************* | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.053) 0:01:16.890 ******* | |
TASK [vault : shared/auth_backend | Test if the auth backend exists] ******************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.936 ******* | |
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] **************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.045) 0:01:16.981 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:12 +0000 (0:00:00.044) 0:01:17.026 ******* | |
PLAY [etcd] ***************************************************************************************************************************************** | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.135) 0:01:17.161 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.020) 0:01:17.182 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.022) 0:01:17.205 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.021) 0:01:17.226 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.430) 0:01:17.657 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:13 +0000 (0:00:00.401) 0:01:18.058 ******* | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:14 +0000 (0:00:00.063) 0:01:18.122 ******* | |
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ***************************************************************************************************************** | |
Friday 29 December 2017 05:49:14 +0000 (0:00:00.179) 0:01:18.301 ******* | |
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
TASK [etcd : Check_certs | check if all certs have already been generated on first master] ********************************************************** | |
Friday 29 December 2017 05:49:14 +0000 (0:00:00.214) 0:01:18.516 ******* | |
ok: [node1 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""} | |
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ************************************** | |
Friday 29 December 2017 05:49:14 +0000 (0:00:00.277) 0:01:18.793 ******* | |
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
TASK [etcd : Check certs | check if a cert already exists on node] ********************************************************************************** | |
Friday 29 December 2017 05:49:14 +0000 (0:00:00.071) 0:01:18.864 ******* | |
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
TASK [etcd : Check_certs | Set 'gen_certs' to true] ************************************************************************************************* | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.356) 0:01:19.221 ******* | |
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ******************************************************************************************** | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.066) 0:01:19.288 ******* | |
ok: [node1] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************ | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.073) 0:01:19.361 ******* | |
TASK [etcd : include] ******************************************************************************************************************************* | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.038) 0:01:19.400 ******* | |
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node1 | |
TASK [etcd : Gen_certs | create etcd cert dir] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.091) 0:01:19.491 ******* | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | create etcd script dir (on node1)] ***************************************************************************************** | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.181) 0:01:19.673 ******* | |
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0} | |
TASK [etcd : Gen_certs | create etcd cert dir (on node1)] ******************************************************************************************* | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.180) 0:01:19.853 ******* | |
ok: [node1 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | write openssl config] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.183) 0:01:20.037 ******* | |
TASK [etcd : Gen_certs | copy certs generation script] ********************************************************************************************** | |
Friday 29 December 2017 05:49:15 +0000 (0:00:00.029) 0:01:20.067 ******* | |
TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************ | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.026) 0:01:20.094 ******* | |
TASK [etcd : set_fact] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.115 ******* | |
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false} | |
TASK [etcd : Gen_certs | Gather etcd master certs] ************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.078) 0:01:20.194 ******* | |
TASK [etcd : Gen_certs | Gather etcd node certs] **************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.027) 0:01:20.222 ******* | |
TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] ************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.023) 0:01:20.245 ******* | |
TASK [etcd : Gen_certs | Write master certs to tempfile] ******************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.022) 0:01:20.267 ******* | |
TASK [etcd : Gen_certs | Unpack certs on masters] *************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.020) 0:01:20.288 ******* | |
TASK [etcd : Gen_certs | Cleanup tempfile] ********************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.309 ******* | |
TASK [etcd : Gen_certs | Copy certs on nodes] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.331 ******* | |
TASK [etcd : Gen_certs | check certificate permissions] ********************************************************************************************* | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.021) 0:01:20.352 ******* | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | target ca-certificate store file] ****************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.177) 0:01:20.530 ******* | |
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
TASK [etcd : Gen_certs | add CA to trusted CA dir] ************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.069) 0:01:20.599 ******* | |
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] ********************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.255) 0:01:20.855 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ******************************************************************************************* | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.022) 0:01:20.877 ******* | |
TASK [etcd : Gen_certs | Get etcd certificate serials] ********************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.020) 0:01:20.897 ******* | |
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.005227", "end": "2017-12-29 05:49:15.729069", "rc": 0, "start": "2017-12-29 05:49:15.723842", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]} | |
TASK [etcd : Set etcd_client_cert_serial] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:16 +0000 (0:00:00.176) 0:01:21.074 ******* | |
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false} | |
TASK [etcd : include] ******************************************************************************************************************************* | |
Friday 29 December 2017 05:49:17 +0000 (0:00:00.068) 0:01:21.143 ******* | |
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1 | |
TASK [etcd : Install | Copy etcdctl binary from docker container] *********************************************************************************** | |
Friday 29 December 2017 05:49:17 +0000 (0:00:00.055) 0:01:21.198 ******* | |
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.144216", "end": "2017-12-29 05:49:16.169502", "rc": 0, "start": "2017-12-29 05:49:16.025286", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d\netcdctl-binarycopy", "stdout_lines": ["0ce227f738aaba4aa9df1abdae14d2689b1e3676fffb0c47d35f798a8f4de61d", "etcdctl-binarycopy"]} | |
TASK [etcd : Configure | Check if cluster is healthy] *********************************************************************************************** | |
Friday 29 December 2017 05:49:17 +0000 (0:00:00.320) 0:01:21.519 ******* | |
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.035846", "end": "2017-12-29 05:49:16.425502", "rc": 0, "start": "2017-12-29 05:49:16.389656", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Configure | Check if member is in cluster] ********************************************************************************************* | |
Friday 29 December 2017 05:49:17 +0000 (0:00:00.253) 0:01:21.773 ******* | |
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --no-sync --endpoints=https://10.12.5.37:2379 member list | grep -q 10.12.5.37", "delta": "0:00:00.033010", "end": "2017-12-29 05:49:16.681513", "rc": 0, "start": "2017-12-29 05:49:16.648503", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Install etcd launch script] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:17 +0000 (0:00:00.256) 0:01:22.029 ******* | |
ok: [node1] => {"changed": false, "checksum": "c961d8258e45cea8cbd161522a23b7ff778ca0b0", "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/usr/local/bin/etcd", "size": 383, "state": "file", "uid": 0} | |
TASK [etcd : Configure | Copy etcd.service systemd file] ******************************************************************************************** | |
Friday 29 December 2017 05:49:18 +0000 (0:00:00.390) 0:01:22.420 ******* | |
ok: [node1] => {"changed": false, "checksum": "643a64e6855d3b34a04abbf561fd843945934936", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/systemd/system/etcd.service", "size": 354, "state": "file", "uid": 0} | |
TASK [etcd : Configure | Join member(s) to cluster one at a time] *********************************************************************************** | |
Friday 29 December 2017 05:49:18 +0000 (0:00:00.374) 0:01:22.795 ******* | |
TASK [etcd : Refresh config | Create etcd config file] ********************************************************************************************** | |
Friday 29 December 2017 05:49:18 +0000 (0:00:00.032) 0:01:22.827 ******* | |
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0} | |
TASK [etcd : Restart etcd if certs changed] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:19 +0000 (0:00:00.416) 0:01:23.244 ******* | |
TASK [etcd : Ensure etcd is running] **************************************************************************************************************** | |
Friday 29 December 2017 05:49:19 +0000 (0:00:00.023) 0:01:23.268 ******* | |
ok: [node1] => {"changed": false, "enabled": true, "name": "etcd", "state": "started", "status": {"ActiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveEnterTimestampMonotonic": "12021983068", "ActiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ActiveExitTimestampMonotonic": "12021816849", "ActiveState": "active", "After": "basic.target systemd-journald.socket sysinit.target docker.service system.slice", "AllowIsolate": "no", "AmbientCapabilities": "0", "AssertResult": "yes", "AssertTimestamp": "Thu 2017-12-28 11:18:59 UTC", "AssertTimestampMonotonic": "12021937928", "Before": "shutdown.target multi-user.target", "BlockIOAccounting": "no", "BlockIOWeight": "18446744073709551615", "CPUAccounting": "no", "CPUQuotaPerSecUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "18446744073709551615", "CPUUsageNSec": "66131984", "CanIsolate": "no", "CanReload": "no", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "18446744073709551615", "ConditionResult": "yes", "ConditionTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ConditionTimestampMonotonic": "12021937928", "Conflicts": "shutdown.target", "ControlGroup": "/system.slice/etcd.service", "ControlPID": "0", "DefaultDependencies": "yes", "Delegate": "no", "Description": "etcd docker wrapper", "DevicePolicy": "auto", "EnvironmentFile": "/etc/etcd.env (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "24198", "ExecMainStartTimestamp": "Thu 2017-12-28 11:18:59 UTC", "ExecMainStartTimestampMonotonic": "12021983008", "ExecMainStatus": "0", "ExecStart": "{ path=/usr/local/bin/etcd ; argv[]=/usr/local/bin/etcd ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[n/a] ; pid=24198 ; code=(null) ; status=0/0 }", "ExecStartPre": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker rm -f etcd1 ; ignore_errors=yes ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24188 ; code=exited ; status=0 }", "ExecStop": "{ path=/usr/bin/docker ; argv[]=/usr/bin/docker stop etcd1 ; ignore_errors=no ; start_time=[Thu 2017-12-28 11:18:59 UTC] ; stop_time=[Thu 2017-12-28 11:18:59 UTC] ; pid=24163 ; code=exited ; status=0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FragmentPath": "/etc/systemd/system/etcd.service", "GuessMainPID": "yes", "IOScheduling": "0", "Id": "etcd.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveEnterTimestampMonotonic": "12021937198", "InactiveExitTimestamp": "Thu 2017-12-28 11:18:59 UTC", "InactiveExitTimestampMonotonic": "12021956288", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KillMode": "control-group", "KillSignal": "15", "LimitAS": "18446744073709551615", "LimitASSoft": "18446744073709551615", "LimitCORE": "18446744073709551615", "LimitCORESoft": "0", "LimitCPU": "18446744073709551615", "LimitCPUSoft": "18446744073709551615", "LimitDATA": "18446744073709551615", "LimitDATASoft": "18446744073709551615", "LimitFSIZE": "18446744073709551615", "LimitFSIZESoft": "18446744073709551615", "LimitLOCKS": "18446744073709551615", "LimitLOCKSSoft": "18446744073709551615", "LimitMEMLOCK": "65536", "LimitMEMLOCKSoft": "65536", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "4096", "LimitNOFILESoft": "1024", "LimitNPROC": "15750", "LimitNPROCSoft": "15750", "LimitRSS": "18446744073709551615", "LimitRSSSoft": "18446744073709551615", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "18446744073709551615", "LimitRTTIMESoft": "18446744073709551615", "LimitSIGPENDING": "15750", "LimitSIGPENDINGSoft": "15750", "LimitSTACK": "18446744073709551615", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "MainPID": "24198", "MemoryAccounting": "no", "MemoryCurrent": "7450624", "MemoryLimit": "18446744073709551615", "MountFlags": "0", "NFileDescriptorStore": "0", "Names": "etcd.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "PermissionsStartOnly": "yes", "PrivateDevices": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "ProtectHome": "no", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "RemainAfterExit": "no", "Requires": "system.slice sysinit.target", "Restart": "always", "RestartUSec": "15s", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "inherit", "StandardInput": "null", "StandardOutput": "journal", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitInterval": "10000000", "StartupBlockIOWeight": "18446744073709551615", "StartupCPUShares": "18446744073709551615", "StateChangeTimestamp": "Thu 2017-12-28 11:18:59 UTC", "StateChangeTimestampMonotonic": "12021983068", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "running", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "0", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "no", "TasksCurrent": "9", "TasksMax": "18446744073709551615", "TimeoutStartUSec": "30s", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "simple", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "enabled", "User": "root", "UtmpMode": "init", "WantedBy": "multi-user.target", "Wants": "docker.socket", "WatchdogTimestamp": "Thu 2017-12-28 11:18:59 UTC", "WatchdogTimestampMonotonic": "12021983067", "WatchdogUSec": "0"}} | |
TASK [etcd : Configure | Check if cluster is healthy] *********************************************************************************************** | |
Friday 29 December 2017 05:49:19 +0000 (0:00:00.184) 0:01:23.453 ******* | |
ok: [node1] => {"changed": false, "cmd": "/usr/local/bin/etcdctl --endpoints=https://10.12.5.37:2379 cluster-health | grep -q 'cluster is healthy'", "delta": "0:00:00.033689", "end": "2017-12-29 05:49:18.357445", "rc": 0, "start": "2017-12-29 05:49:18.323756", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
TASK [etcd : Refresh config | Create etcd config file] ********************************************************************************************** | |
Friday 29 December 2017 05:49:19 +0000 (0:00:00.250) 0:01:23.703 ******* | |
ok: [node1] => {"changed": false, "checksum": "3332c5fe8758ea0621847232509f7487a781661e", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/etcd.env", "size": 875, "state": "file", "uid": 0} | |
PLAY [k8s-cluster:calico-rr] ************************************************************************************************************************ | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:20 +0000 (0:00:00.444) 0:01:24.148 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:49:20 +0000 (0:00:00.042) 0:01:24.191 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:49:20 +0000 (0:00:00.043) 0:01:24.235 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:20 +0000 (0:00:00.020) 0:01:24.255 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:20 +0000 (0:00:00.528) 0:01:24.784 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:21 +0000 (0:00:00.500) 0:01:25.285 ******* | |
ok: [node2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:21 +0000 (0:00:00.105) 0:01:25.390 ******* | |
ok: [node3] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
ok: [node2] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
ok: [node1] => {"changed": false, "gid": 997, "name": "etcd", "state": "present", "system": true} | |
TASK [adduser : User | Create User] ***************************************************************************************************************** | |
Friday 29 December 2017 05:49:21 +0000 (0:00:00.235) 0:01:25.626 ******* | |
ok: [node3] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
ok: [node2] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
ok: [node1] => {"append": false, "changed": false, "comment": "Etcd user", "group": 997, "home": "/var/lib/etcd", "move_home": false, "name": "etcd", "shell": "/bin/nologin", "state": "present", "uid": 998} | |
TASK [etcd : Check_certs | check if all certs have already been generated on first master] ********************************************************** | |
Friday 29 December 2017 05:49:21 +0000 (0:00:00.269) 0:01:25.895 ******* | |
ok: [node2 -> None] => {"changed": false, "examined": 12, "files": [{"atime": 1514459947.704, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459950.54, "checksum": "3bb643c8ddf9ee0b6baaf93805fc63962e5cf57e", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522183, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.196, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "ade3addf27f16aa19093dc3aac030a108d76ef6c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522180, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.152, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "fb8aa806ecc6efa79cce6da17faf99b38d8eb876", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522177, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.88, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1204, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.704, "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522175, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459929.868, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514460475.756, "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}, {"atime": 1514459947.716, "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459946.412, "dev": 64769, "gid": 0, "inode": 522178, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0700", "mtime": 1514459930.144, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}], "matched": 7, "msg": ""} | |
TASK [etcd : Check_certs | Set default value for 'sync_certs', 'gen_certs' and 'etcd_secret_changed' to false] ************************************** | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.179) 0:01:26.075 ******* | |
ok: [node1] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"etcd_secret_changed": false, "gen_certs": false, "sync_certs": false}, "changed": false} | |
TASK [etcd : Check certs | check if a cert already exists on node] ********************************************************************************** | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.113) 0:01:26.189 ******* | |
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459947.704, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522167, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.464, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "727116751", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.58, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522070, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072158681630", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459948.244, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522154, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ccaa1e0386b7f061d82c00d5986d029", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/ca.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1090, "uid": 999, "version": "18446744072310589013", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"atime": 1514460483.48, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "b723851efff5c870f12425122562b9ba747e96fc", "ctime": 1514459948.048, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522072, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "46d57482cfbfcc2be8c8499f59d90923", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459929.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node2-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "18446744072158681632", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"atime": 1514460475.756, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "051c4b96e58aaec2e236ba6e75833978daf90b26", "ctime": 1514459946.412, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522181, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "b39f11dab64683147f180e645aa7f322", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.184, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node1-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1679, "uid": 999, "version": "727116765", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"atime": 1514460483.092, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "0b9f2c142df29f8d45fba6086eca19790b90760c", "ctime": 1514459947.668, "dev": 64769, "device_type": 0, "executable": true, "exists": true, "gid": 0, "gr_name": "root", "inode": 522156, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "52031e8c0a74b1397285a81d590de184", "mimetype": "text/plain", "mode": "0700", "mtime": 1514459930.0, "nlink": 1, "path": "/etc/ssl/etcd/ssl/node-node3-key.pem", "pw_name": "kube", "readable": true, "rgrp": false, "roth": false, "rusr": true, "size": 1675, "uid": 999, "version": "18446744072310589015", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": true}} | |
TASK [etcd : Check_certs | Set 'gen_certs' to true] ************************************************************************************************* | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.417) 0:01:26.606 ******* | |
TASK [etcd : Check_certs | Set 'gen_node_certs' to true] ******************************************************************************************** | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.065) 0:01:26.672 ******* | |
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": false, "node2": false, "node3": false}}, "changed": false} | |
TASK [etcd : Check_certs | Set 'sync_certs' to true] ************************************************************************************************ | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.070) 0:01:26.743 ******* | |
TASK [etcd : include] ******************************************************************************************************************************* | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.069) 0:01:26.812 ******* | |
included: /home/ubuntu/kubespray/roles/etcd/tasks/gen_certs_script.yml for node2, node3, node1 | |
TASK [etcd : Gen_certs | create etcd cert dir] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:22 +0000 (0:00:00.110) 0:01:26.923 ******* | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | create etcd script dir (on node1)] ***************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.239) 0:01:27.162 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/etcd-scripts", "size": 4096, "state": "directory", "uid": 0} | |
TASK [etcd : Gen_certs | create etcd cert dir (on node1)] ******************************************************************************************* | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.183) 0:01:27.346 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | write openssl config] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.182) 0:01:27.528 ******* | |
TASK [etcd : Gen_certs | copy certs generation script] ********************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.028) 0:01:27.557 ******* | |
TASK [etcd : Gen_certs | run cert generation script] ************************************************************************************************ | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.026) 0:01:27.583 ******* | |
TASK [etcd : set_fact] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.021) 0:01:27.604 ******* | |
ok: [node1] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "my_node_certs": ["ca.pem", "node-node1.pem", "node-node1-key.pem"]}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node2.pem", "admin-node2-key.pem", "member-node2.pem", "member-node2-key.pem"], "my_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem"]}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"all_master_certs": ["ca-key.pem", "admin-node1.pem", "admin-node1-key.pem", "member-node1.pem", "member-node1-key.pem"], "all_node_certs": ["ca.pem", "node-node2.pem", "node-node2-key.pem", "node-node3.pem", "node-node3-key.pem", "node-node1.pem", "node-node1-key.pem"], "my_master_certs": ["ca-key.pem", "admin-node3.pem", "admin-node3-key.pem", "member-node3.pem", "member-node3-key.pem"], "my_node_certs": ["ca.pem", "node-node3.pem", "node-node3-key.pem"]}, "changed": false} | |
TASK [etcd : Gen_certs | Gather etcd master certs] ************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.135) 0:01:27.740 ******* | |
TASK [etcd : Gen_certs | Gather etcd node certs] **************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.059) 0:01:27.800 ******* | |
TASK [etcd : Gen_certs | Prepare tempfile for unpacking certs] ************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.054) 0:01:27.854 ******* | |
TASK [etcd : Gen_certs | Write master certs to tempfile] ******************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.045) 0:01:27.899 ******* | |
TASK [etcd : Gen_certs | Unpack certs on masters] *************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.043) 0:01:27.942 ******* | |
TASK [etcd : Gen_certs | Cleanup tempfile] ********************************************************************************************************** | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.046) 0:01:27.988 ******* | |
TASK [etcd : Gen_certs | Copy certs on nodes] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.040) 0:01:28.029 ******* | |
TASK [etcd : Gen_certs | check certificate permissions] ********************************************************************************************* | |
Friday 29 December 2017 05:49:23 +0000 (0:00:00.041) 0:01:28.070 ******* | |
ok: [node1] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node2] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "kube", "path": "/etc/ssl/etcd/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [etcd : Gen_certs | target ca-certificate store file] ****************************************************************************************** | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.210) 0:01:28.281 ******* | |
ok: [node1] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"ca_cert_path": "/usr/local/share/ca-certificates/etcd-ca.crt"}, "changed": false} | |
TASK [etcd : Gen_certs | add CA to trusted CA dir] ************************************************************************************************** | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.114) 0:01:28.395 ******* | |
ok: [node1] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
ok: [node2] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
ok: [node3] => {"changed": false, "checksum": "f3739aaea4f00674b7d186044ff94c73e46e8b63", "dest": "/usr/local/share/ca-certificates/etcd-ca.crt", "gid": 0, "group": "root", "md5sum": "6ccaa1e0386b7f061d82c00d5986d029", "mode": "0644", "owner": "root", "size": 1090, "src": "/etc/ssl/etcd/ssl/ca.pem", "state": "file", "uid": 0} | |
TASK [etcd : Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)] ********************************************************** | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.220) 0:01:28.616 ******* | |
TASK [etcd : Gen_certs | update ca-certificates (RedHat)] ******************************************************************************************* | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.046) 0:01:28.663 ******* | |
TASK [etcd : Gen_certs | Get etcd certificate serials] ********************************************************************************************** | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.042) 0:01:28.705 ******* | |
ok: [node2] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node2.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004272", "end": "2017-12-29 05:49:23.519991", "rc": 0, "start": "2017-12-29 05:49:23.515719", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823961", "stdout_lines": ["B13862C721823961"]} | |
ok: [node3] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node3.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004302", "end": "2017-12-29 05:49:23.379262", "rc": 0, "start": "2017-12-29 05:49:23.374960", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823962", "stdout_lines": ["B13862C721823962"]} | |
ok: [node1] => {"changed": false, "cmd": "openssl x509 -in /etc/ssl/etcd/ssl/node-node1.pem -noout -serial | cut -d= -f2", "delta": "0:00:00.004650", "end": "2017-12-29 05:49:23.584640", "rc": 0, "start": "2017-12-29 05:49:23.579990", "stderr": "", "stderr_lines": [], "stdout": "B13862C721823963", "stdout_lines": ["B13862C721823963"]} | |
TASK [etcd : Set etcd_client_cert_serial] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.222) 0:01:28.928 ******* | |
ok: [node1] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823963"}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823961"}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"etcd_client_cert_serial": "B13862C721823962"}, "changed": false} | |
TASK [etcd : include] ******************************************************************************************************************************* | |
Friday 29 December 2017 05:49:24 +0000 (0:00:00.112) 0:01:29.041 ******* | |
included: /home/ubuntu/kubespray/roles/etcd/tasks/install_docker.yml for node1 | |
TASK [etcd : Install | Copy etcdctl binary from docker container] *********************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.094) 0:01:29.136 ******* | |
ok: [node1] => {"attempts": 1, "changed": false, "cmd": ["sh", "-c", "/usr/bin/docker rm -f etcdctl-binarycopy; /usr/bin/docker create --name etcdctl-binarycopy quay.io/coreos/etcd:v3.2.4 && /usr/bin/docker cp etcdctl-binarycopy:/usr/local/bin/etcdctl /usr/local/bin/etcdctl && /usr/bin/docker rm -f etcdctl-binarycopy"], "delta": "0:00:00.140128", "end": "2017-12-29 05:49:24.180702", "rc": 0, "start": "2017-12-29 05:49:24.040574", "stderr": "Error response from daemon: No such container: etcdctl-binarycopy", "stderr_lines": ["Error response from daemon: No such container: etcdctl-binarycopy"], "stdout": "e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f\netcdctl-binarycopy", "stdout_lines": ["e31da9fe17f72362840ed96a0f21f63fcb5fdf4444dbf72e31d10435be84587f", "etcdctl-binarycopy"]} | |
TASK [etcd : Configure | Check if cluster is healthy] *********************************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.398) 0:01:29.534 ******* | |
TASK [etcd : Configure | Check if member is in cluster] ********************************************************************************************* | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.159) 0:01:29.693 ******* | |
TASK [etcd : Install etcd launch script] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.045) 0:01:29.739 ******* | |
TASK [etcd : Configure | Copy etcd.service systemd file] ******************************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.046) 0:01:29.785 ******* | |
TASK [etcd : Configure | Join member(s) to cluster one at a time] *********************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.052) 0:01:29.837 ******* | |
TASK [etcd : Refresh config | Create etcd config file] ********************************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.063) 0:01:29.900 ******* | |
TASK [etcd : Restart etcd if certs changed] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.048) 0:01:29.949 ******* | |
TASK [etcd : Ensure etcd is running] **************************************************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.045) 0:01:29.995 ******* | |
TASK [etcd : Configure | Check if cluster is healthy] *********************************************************************************************** | |
Friday 29 December 2017 05:49:25 +0000 (0:00:00.044) 0:01:30.040 ******* | |
TASK [etcd : Refresh config | Create etcd config file] ********************************************************************************************** | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.046) 0:01:30.087 ******* | |
PLAY [etcd:k8s-cluster:vault:calico-rr] ************************************************************************************************************* | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.179) 0:01:30.266 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.049) 0:01:30.316 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.045) 0:01:30.361 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.022) 0:01:30.384 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:26 +0000 (0:00:00.600) 0:01:30.985 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.506) 0:01:31.491 ******* | |
ok: [node3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [adduser : User | Create User Group] *********************************************************************************************************** | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.323) 0:01:31.814 ******* | |
TASK [adduser : User | Create User] ***************************************************************************************************************** | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.043) 0:01:31.857 ******* | |
TASK [vault : stop vault-temp container] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.046) 0:01:31.903 ******* | |
TASK [vault : check_vault | Attempt to pull local https Vault health] ******************************************************************************* | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.041) 0:01:31.945 ******* | |
TASK [vault : check_vault | Set facts about local Vault health] ************************************************************************************* | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.047) 0:01:31.993 ******* | |
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] **************************************************************** | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.042) 0:01:32.036 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:27 +0000 (0:00:00.024) 0:01:32.060 ******* | |
TASK [vault : bootstrap/sync_secrets | Set fact based on sync_file_results] ************************************************************************* | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.065) 0:01:32.126 ******* | |
TASK [vault : bootstrap/sync_secrets | Reset sync_file_results to avoid variable bleed] ************************************************************* | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.037) 0:01:32.163 ******* | |
TASK [vault : bootstrap/sync_secrets | Print out warning message if secrets are not available and vault is initialized] ***************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.209 ******* | |
TASK [vault : bootstrap/sync_secrets | Cat root_token from a vault host] **************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.021) 0:01:32.231 ******* | |
TASK [vault : bootstrap/sync_secrets | Cat unseal_keys from a vault host] *************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.043) 0:01:32.275 ******* | |
TASK [vault : bootstrap/sync_secrets | Set needed facts for Vault API interaction when Vault is already running] ************************************ | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.047) 0:01:32.322 ******* | |
TASK [vault : bootstrap/sync_secrets | Update vault_headers if we have the root_token] ************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.044) 0:01:32.366 ******* | |
TASK [vault : find_leader | Find the current http Vault leader] ************************************************************************************* | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.412 ******* | |
TASK [vault : find_leader | Set fact for current http leader] *************************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.048) 0:01:32.461 ******* | |
TASK [vault : find_leader| show vault_leader_url] *************************************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.510 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.044) 0:01:32.555 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.052) 0:01:32.607 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.045) 0:01:32.653 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.702 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.047) 0:01:32.749 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.048) 0:01:32.797 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.050) 0:01:32.847 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.897 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.043) 0:01:32.940 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.049) 0:01:32.990 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:28 +0000 (0:00:00.046) 0:01:33.036 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.085 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.135 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.046) 0:01:33.182 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.051) 0:01:33.233 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.053) 0:01:33.286 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.334 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.053) 0:01:33.387 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.434 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.050) 0:01:33.485 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.051) 0:01:33.536 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Set facts for vault sync_file results] ******************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.586 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after ca.pem sync] *************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.041) 0:01:33.628 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.677 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.724 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.049) 0:01:33.774 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.047) 0:01:33.821 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.050) 0:01:33.871 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.046) 0:01:33.918 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.048) 0:01:33.967 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.052) 0:01:34.019 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:29 +0000 (0:00:00.045) 0:01:34.065 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.110 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.159 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.204 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.044) 0:01:34.249 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.051) 0:01:34.301 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.349 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.052) 0:01:34.401 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:34.447 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.052) 0:01:34.500 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.047) 0:01:34.548 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.050) 0:01:34.598 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:34.644 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Set fact if Vault's API cert is needed] ****************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.053) 0:01:34.698 ******* | |
TASK [vault : bootstrap/sync_vault_certs | Unset sync_file_results after api.pem sync] ************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.042) 0:01:34.740 ******* | |
TASK [vault : sync_file | Set facts for directory and file when sync_file_path is defined] ********************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.043) 0:01:34.784 ******* | |
TASK [vault : sync_file | Set fact for sync_file_path when undefined] ******************************************************************************* | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.830 ******* | |
TASK [vault : sync_file | Set fact for key path name] *********************************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.048) 0:01:34.879 ******* | |
TASK [vault : sync_file | Check if {{sync_file_path}} file exists] ********************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.045) 0:01:34.925 ******* | |
TASK [vault : sync_file | Check if {{ sync_file_key_path }} key file exists] ************************************************************************ | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.047) 0:01:34.972 ******* | |
TASK [vault : sync_file | Combine all possible file sync sources] *********************************************************************************** | |
Friday 29 December 2017 05:49:30 +0000 (0:00:00.046) 0:01:35.018 ******* | |
TASK [vault : sync_file | Combine all possible key file sync sources] ******************************************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.066) 0:01:35.085 ******* | |
TASK [vault : sync_file | Remove sync sources with files that do not match sync_file_srcs|first] **************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.065) 0:01:35.150 ******* | |
TASK [vault : sync_file | Remove sync sources with keys that do not match sync_file_srcs|first] ***************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.196 ******* | |
TASK [vault : sync_file | Consolidate file and key sources] ***************************************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.047) 0:01:35.243 ******* | |
TASK [vault : sync_file | Set facts for situations where sync is not needed] ************************************************************************ | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.289 ******* | |
TASK [vault : sync_file | Set sync_file_result fact] ************************************************************************************************ | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.043) 0:01:35.332 ******* | |
TASK [vault : sync_file | Update sync_file_results fact] ******************************************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.378 ******* | |
TASK [vault : sync_file | Cat the file] ************************************************************************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.048) 0:01:35.426 ******* | |
TASK [vault : sync_file | Cat the key file] ********************************************************************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.050) 0:01:35.476 ******* | |
TASK [vault : sync_file | Set facts for file contents] ********************************************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.048) 0:01:35.525 ******* | |
TASK [vault : sync_file | Set fact for key contents] ************************************************************************************************ | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.053) 0:01:35.578 ******* | |
TASK [vault : sync_file | Ensure the directory exists] ********************************************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.046) 0:01:35.625 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_path }} to hosts that don't have it] ******************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.054) 0:01:35.679 ******* | |
TASK [vault : sync_file | Copy {{ sync_file_key_path }} to hosts that don't have it] **************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.049) 0:01:35.728 ******* | |
TASK [vault : Unset local vars to avoid variable bleed into next iteration] ************************************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.052) 0:01:35.781 ******* | |
TASK [vault : bootstrap/sync_etcd_certs | Set facts for etcd sync_file results] ********************************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.044) 0:01:35.825 ******* | |
TASK [vault : bootstrap/sync_etcd_certs | Unset sync_file_results after ca.pem sync] **************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.043) 0:01:35.868 ******* | |
TASK [vault : bootstrap/start_vault_temp | Ensure vault-temp isn't already running] ***************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:35.914 ******* | |
TASK [vault : bootstrap/start_vault_temp | Start single node Vault with file backend] *************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.042) 0:01:35.956 ******* | |
TASK [vault : bootstrap/start_vault_temp | Start again single node Vault with file backend] ********************************************************* | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.045) 0:01:36.002 ******* | |
TASK [vault : bootstrap/start_vault_temp | Initialize vault-temp] *********************************************************************************** | |
Friday 29 December 2017 05:49:31 +0000 (0:00:00.041) 0:01:36.044 ******* | |
TASK [vault : bootstrap/start_vault_temp | Set needed vault facts] ********************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.044) 0:01:36.089 ******* | |
TASK [vault : bootstrap/start_vault_temp | Unseal vault-temp] *************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.043) 0:01:36.132 ******* | |
TASK [vault : vault | Set fact about vault leader url] ********************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.041) 0:01:36.174 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.043) 0:01:36.217 ******* | |
TASK [vault : shared/auth_backend | Test if the auth backend exists] ******************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.058) 0:01:36.276 ******* | |
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] **************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.042) 0:01:36.318 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.046) 0:01:36.365 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/vault/ssl exists] ***************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.099) 0:01:36.465 ******* | |
TASK [vault : bootstrap/gen_ca | Generate vault root CA] ******************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.067) 0:01:36.533 ******* | |
TASK [vault : bootstrap/gen_ca | Copy vault root CA cert locally] *********************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.030) 0:01:36.563 ******* | |
TASK [vault : bootstrap/gen_ca | Copy vault root CA key locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.054) 0:01:36.617 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/ssl/etcd/ssl exists] ************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.056) 0:01:36.674 ******* | |
TASK [vault : bootstrap/gen_ca | Generate etcd root CA] ********************************************************************************************* | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.060) 0:01:36.734 ******* | |
TASK [vault : bootstrap/gen_ca | Copy etcd root CA cert locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.031) 0:01:36.765 ******* | |
TASK [vault : bootstrap/gen_ca | Copy etcd root CA key locally] ************************************************************************************* | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.059) 0:01:36.825 ******* | |
TASK [vault : issue_cert | Ensure target directory exists] ****************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.044) 0:01:36.870 ******* | |
TASK [vault : issue_cert | Read in the local credentials] ******************************************************************************************* | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.050) 0:01:36.920 ******* | |
TASK [vault : gen_certs_vault | Set facts for read Vault Creds] ************************************************************************************* | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.026) 0:01:36.947 ******* | |
TASK [vault : gen_certs_vault | Log into Vault and obtain an token] ********************************************************************************* | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.029) 0:01:36.976 ******* | |
TASK [vault : gen_certs_vault | Set fact for vault_client_token] ************************************************************************************ | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.021) 0:01:36.997 ******* | |
TASK [vault : gen_certs_vault | Set fact for Vault API token] *************************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.023) 0:01:37.021 ******* | |
TASK [vault : issue_cert | Generate /etc/vault/ssl/api.pem for vault role] ************************************************************************** | |
Friday 29 December 2017 05:49:32 +0000 (0:00:00.041) 0:01:37.062 ******* | |
TASK [vault : issue_cert | Copy /etc/vault/ssl/api.pem cert to all hosts] *************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.025) 0:01:37.088 ******* | |
TASK [vault : issue_cert | Copy key for /etc/vault/ssl/api.pem to all hosts] ************************************************************************ | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.055) 0:01:37.143 ******* | |
TASK [vault : issue_cert | Copy issuing CA cert] **************************************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.188 ******* | |
TASK [vault : issue_cert | Copy certificate serial to all hosts] ************************************************************************************ | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.048) 0:01:37.237 ******* | |
TASK [vault : bootstrap/ca_trust | pull CA from cert from {{groups.vault|first}}] ******************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.054) 0:01:37.292 ******* | |
TASK [vault : bootstrap/ca_trust | target ca-certificate store file] ******************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.047) 0:01:37.339 ******* | |
TASK [vault : bootstrap/ca_trust | add CA to trusted CA dir] **************************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.045) 0:01:37.384 ******* | |
TASK [vault : bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS)] ******************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.429 ******* | |
TASK [vault : bootstrap/ca_trust | update ca-certificates (RedHat)] ********************************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.472 ******* | |
TASK [vault : stop vault-temp container] ************************************************************************************************************ | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.515 ******* | |
TASK [vault : check_vault | Attempt to pull local https Vault health] ******************************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.558 ******* | |
TASK [vault : check_vault | Set facts about local Vault health] ************************************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.046) 0:01:37.605 ******* | |
TASK [vault : check_vault | Set fact about the Vault cluster's initialization state] **************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.650 ******* | |
TASK [vault : check_etcd | Check if etcd is up and reachable] *************************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.029) 0:01:37.679 ******* | |
TASK [vault : check_etcd | Set fact based off the etcd_health_check response] *********************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.024) 0:01:37.703 ******* | |
TASK [vault : set_fact] ***************************************************************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.042) 0:01:37.746 ******* | |
TASK [vault : check_etcd | Fail if etcd is not available and needed] ******************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.789 ******* | |
TASK [vault : cluster/configure | Ensure the vault/config directory exists] ************************************************************************* | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.833 ******* | |
TASK [vault : cluster/configure | Lay down the configuration file] ********************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.044) 0:01:37.877 ******* | |
TASK [vault : cluster/binary | Copy vault binary from downloaddir] ********************************************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.043) 0:01:37.921 ******* | |
TASK [vault : cluster/systemd | Ensure mount points exist prior to vault.service startup] *********************************************************** | |
Friday 29 December 2017 05:49:33 +0000 (0:00:00.045) 0:01:37.966 ******* | |
TASK [vault : cluster/systemd | Ensure the vault user has access to needed directories] ************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.113) 0:01:38.080 ******* | |
TASK [vault : cluster/systemd | Copy down vault.service systemd file] ******************************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.084) 0:01:38.164 ******* | |
TASK [vault : Create vault service systemd directory] *********************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.208 ******* | |
TASK [vault : cluster/systemd | Add vault proxy env vars] ******************************************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.254 ******* | |
TASK [vault : cluster/systemd | Enable vault.service] *********************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.296 ******* | |
TASK [vault : cluster/systemd | Query local vault until service is up] ****************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.341 ******* | |
TASK [vault : cluster/init | Initialize Vault] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.383 ******* | |
TASK [vault : cluster/init | Set facts on the results of the initialization] ************************************************************************ | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.428 ******* | |
TASK [vault : cluster/init | Ensure all hosts have these facts] ************************************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.472 ******* | |
TASK [vault : cluster/init | Ensure the vault_secrets_dir exists] *********************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.050) 0:01:38.522 ******* | |
TASK [vault : cluster/init | Ensure all in groups.vault have the unseal_keys locally] *************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.566 ******* | |
TASK [vault : cluster/init | Ensure all in groups.vault have the root_token locally] **************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.044) 0:01:38.610 ******* | |
TASK [vault : cluster/init | Ensure vault_headers and vault statuses are updated] ******************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.045) 0:01:38.655 ******* | |
TASK [vault : cluster/unseal | Current sealed state] ************************************************************************************************ | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.699 ******* | |
TASK [vault : cluster/unseal | Unseal Vault] ******************************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.047) 0:01:38.746 ******* | |
TASK [vault : cluster/unseal | Wait until server is ready] ****************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.037) 0:01:38.783 ******* | |
TASK [vault : find_leader | Find the current http Vault leader] ************************************************************************************* | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.827 ******* | |
TASK [vault : find_leader | Set fact for current http leader] *************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.041) 0:01:38.868 ******* | |
TASK [vault : find_leader| show vault_leader_url] *************************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.051) 0:01:38.920 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:34 +0000 (0:00:00.043) 0:01:38.964 ******* | |
TASK [vault : bootstrap/gen_ca | Ensure cert_dir /etc/kubernetes/ssl exists] ************************************************************************ | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.125) 0:01:39.089 ******* | |
TASK [vault : bootstrap/gen_ca | Generate kube root CA] ********************************************************************************************* | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.057) 0:01:39.147 ******* | |
TASK [vault : bootstrap/gen_ca | Copy kube root CA cert locally] ************************************************************************************ | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.034) 0:01:39.182 ******* | |
TASK [vault : bootstrap/gen_ca | Copy kube root CA key locally] ************************************************************************************* | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.054) 0:01:39.236 ******* | |
TASK [vault : shared/auth_backend | Test if the auth backend exists] ******************************************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.044) 0:01:39.281 ******* | |
TASK [vault : shared/auth_backend | Add the cert auth backend if needed] **************************************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.043) 0:01:39.324 ******* | |
TASK [vault : include] ****************************************************************************************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.043) 0:01:39.367 ******* | |
PLAY [k8s-cluster] ********************************************************************************************************************************** | |
TASK [download : Register docker images info] ******************************************************************************************************* | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.155) 0:01:39.523 ******* | |
TASK [download : container_download | Create dest directory for saved/loaded container images] ****************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.044) 0:01:39.568 ******* | |
TASK [download : container_download | create local directory for saved/loaded container images] ***************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.047) 0:01:39.615 ******* | |
TASK [download : Download items] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:35 +0000 (0:00:00.021) 0:01:39.637 ******* | |
TASK [download : Sync container] ******************************************************************************************************************** | |
Friday 29 December 2017 05:49:36 +0000 (0:00:00.562) 0:01:40.200 ******* | |
TASK [kubespray-defaults : Configure defaults] ****************************************************************************************************** | |
Friday 29 December 2017 05:49:36 +0000 (0:00:00.664) 0:01:40.864 ******* | |
ok: [node2] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node3] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
ok: [node1] => { | |
"msg": "Check roles/kubespray-defaults/defaults/main.yml" | |
} | |
TASK [kubernetes/secrets : Check_certs | check if the certs have already been generated on first master] ******************************************** | |
Friday 29 December 2017 05:49:37 +0000 (0:00:00.408) 0:01:41.272 ******* | |
ok: [node2 -> None] => {"changed": false, "examined": 4, "files": [{"atime": 1514459963.14, "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "gid": 0, "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}, {"atime": 1514459963.14, "checksum": "cace111fd87fb2c14f7a07fea3e515746edad2ee", "ctime": 1514456736.392, "dev": 64769, "gid": 0, "inode": 522101, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1514456736.208, "nlink": 1, "path": "/etc/kubernetes/ssl/ca-key.pem", "rgrp": true, "roth": true, "rusr": true, "size": 1675, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}], "matched": 2, "msg": ""} | |
TASK [kubernetes/secrets : Check_certs | Set default value for 'sync_certs', 'gen_certs', and 'secret_changed' to false] *************************** | |
Friday 29 December 2017 05:49:37 +0000 (0:00:00.324) 0:01:41.597 ******* | |
ok: [node1] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"gen_certs": false, "secret_changed": false, "sync_certs": false}, "changed": false} | |
TASK [kubernetes/secrets : Check certs | check if a cert already exists on node] ******************************************************************** | |
Friday 29 December 2017 05:49:37 +0000 (0:00:00.359) 0:01:41.957 ******* | |
ok: [node2] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514526363.216, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514525695.876, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522013, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514525695.872, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072158684721", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [node3] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514474667.028, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514474126.648, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522128, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514474126.648, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "18446744072310591063", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [node1] => (item=ca.pem) => {"changed": false, "item": "ca.pem", "stat": {"atime": 1514459963.14, "attr_flags": "e", "attributes": ["extents"], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "bc3ec95b7fa220a5c14f96629333674265b38cf4", "ctime": 1514456735.892, "dev": 64769, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 522100, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "md5": "6ba863db0a301f222eabf930ccf7c717", "mimetype": "text/plain", "mode": "0644", "mtime": 1514456735.72, "nlink": 1, "path": "/etc/kubernetes/ssl/ca.pem", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 1346, "uid": 0, "version": "727079457", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} | |
ok: [node2] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=apiserver.pem) => {"changed": false, "item": "apiserver.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=apiserver-key.pem) => {"changed": false, "item": "apiserver-key.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-scheduler.pem) => {"changed": false, "item": "kube-scheduler.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-scheduler-key.pem) => {"changed": false, "item": "kube-scheduler-key.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-controller-manager.pem) => {"changed": false, "item": "kube-controller-manager.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-controller-manager-key.pem) => {"changed": false, "item": "kube-controller-manager-key.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=admin-node2.pem) => {"changed": false, "item": "admin-node2.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=admin-node3.pem) => {"changed": false, "item": "admin-node3.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=admin-node1.pem) => {"changed": false, "item": "admin-node1.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=admin-node2-key.pem) => {"changed": false, "item": "admin-node2-key.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=admin-node3-key.pem) => {"changed": false, "item": "admin-node3-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=admin-node1-key.pem) => {"changed": false, "item": "admin-node1-key.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=node-node2.pem) => {"changed": false, "item": "node-node2.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=node-node3.pem) => {"changed": false, "item": "node-node3.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=node-node1.pem) => {"changed": false, "item": "node-node1.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=node-node2-key.pem) => {"changed": false, "item": "node-node2-key.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=node-node3-key.pem) => {"changed": false, "item": "node-node3-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=node-node1-key.pem) => {"changed": false, "item": "node-node1-key.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-proxy-node2.pem) => {"changed": false, "item": "kube-proxy-node2.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-proxy-node3.pem) => {"changed": false, "item": "kube-proxy-node3.pem", "stat": {"exists": false}} | |
ok: [node2] => (item=kube-proxy-node2-key.pem) => {"changed": false, "item": "kube-proxy-node2-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-proxy-node1.pem) => {"changed": false, "item": "kube-proxy-node1.pem", "stat": {"exists": false}} | |
ok: [node3] => (item=kube-proxy-node3-key.pem) => {"changed": false, "item": "kube-proxy-node3-key.pem", "stat": {"exists": false}} | |
ok: [node1] => (item=kube-proxy-node1-key.pem) => {"changed": false, "item": "kube-proxy-node1-key.pem", "stat": {"exists": false}} | |
TASK [kubernetes/secrets : Check_certs | Set 'gen_certs' to true] *********************************************************************************** | |
Friday 29 December 2017 05:49:41 +0000 (0:00:03.511) 0:01:45.469 ******* | |
ok: [node2] => (item=['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem', '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem' ] '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' , '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' , '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem' ]) => {"ansible_facts": {"gen_certs": true}, "ansible_facts_cacheable": false, "changed": false, "item": "['/etc/kubernetes/ssl/ca.pem', '/etc/kubernetes/ssl/apiserver.pem', '/etc/kubernetes/ssl/apiserver-key.pem', '/etc/kubernetes/ssl/kube-scheduler.pem', '/etc/kubernetes/ssl/kube-scheduler-key.pem', '/etc/kubernetes/ssl/kube-controller-manager.pem', '/etc/kubernetes/ssl/kube-controller-manager-key.pem', '/etc/kubernetes/ssl/admin-node1.pem' '/etc/kubernetes/ssl/admin-node1-key.pem' ] '/etc/kubernetes/ssl/node-node2.pem' '/etc/kubernetes/ssl/node-node2-key.pem' '/etc/kubernetes/ssl/kube-proxy-node2.pem' '/etc/kubernetes/ssl/kube-proxy-node2-key.pem' , '/etc/kubernetes/ssl/node-node3.pem' '/etc/kubernetes/ssl/node-node3-key.pem' '/etc/kubernetes/ssl/kube-proxy-node3.pem' '/etc/kubernetes/ssl/kube-proxy-node3-key.pem' , '/etc/kubernetes/ssl/node-node1.pem' '/etc/kubernetes/ssl/node-node1-key.pem' '/etc/kubernetes/ssl/kube-proxy-node1.pem' '/etc/kubernetes/ssl/kube-proxy-node1-key.pem' ]"} | |
TASK [kubernetes/secrets : Check_certs | Set 'gen_master_certs' to true] **************************************************************************** | |
Friday 29 December 2017 05:49:41 +0000 (0:00:00.229) 0:01:45.698 ******* | |
ok: [node2] => {"ansible_facts": {"gen_master_certs": " False"}, "changed": false} | |
TASK [kubernetes/secrets : Check_certs | Set 'gen_node_certs' to true] ****************************************************************************** | |
Friday 29 December 2017 05:49:41 +0000 (0:00:00.223) 0:01:45.922 ******* | |
ok: [node2] => {"ansible_facts": {"gen_node_certs": {"node1": true, "node2": true, "node3": true}}, "changed": false} | |
TASK [kubernetes/secrets : Check_certs | Set 'sync_certs' to true] ********************************************************************************** | |
Friday 29 December 2017 05:49:42 +0000 (0:00:00.305) 0:01:46.227 ******* | |
ok: [node2] => {"ansible_facts": {"sync_certs": true}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"sync_certs": true}, "changed": false} | |
ok: [node3] => {"ansible_facts": {"sync_certs": true}, "changed": false} | |
TASK [kubernetes/secrets : Check_tokens | check if the tokens have already been generated on first master] ****************************************** | |
Friday 29 December 2017 05:49:42 +0000 (0:00:00.392) 0:01:46.620 ******* | |
ok: [node2 -> None] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/secrets : Check_tokens | Set default value for 'sync_tokens' and 'gen_tokens' to false] ******************************************** | |
Friday 29 December 2017 05:49:42 +0000 (0:00:00.324) 0:01:46.945 ******* | |
ok: [node3] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false} | |
ok: [node2] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false} | |
ok: [node1] => {"ansible_facts": {"gen_tokens": false, "sync_tokens": false}, "changed": false} | |
TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' and 'gen_tokens' to true] *************************************************************** | |
Friday 29 December 2017 05:49:43 +0000 (0:00:00.359) 0:01:47.305 ******* | |
ok: [node2] => {"ansible_facts": {"gen_tokens": true}, "changed": false} | |
TASK [kubernetes/secrets : Check tokens | check if a cert already exists] *************************************************************************** | |
Friday 29 December 2017 05:49:43 +0000 (0:00:00.209) 0:01:47.514 ******* | |
ok: [node2] => {"changed": false, "stat": {"exists": false}} | |
ok: [node1] => {"changed": false, "stat": {"exists": false}} | |
ok: [node3] => {"changed": false, "stat": {"exists": false}} | |
TASK [kubernetes/secrets : Check_tokens | Set 'sync_tokens' to true] ******************************************************************************** | |
Friday 29 December 2017 05:49:43 +0000 (0:00:00.455) 0:01:47.970 ******* | |
ok: [node2] => {"ansible_facts": {"sync_tokens": true}, "changed": false} | |
TASK [kubernetes/secrets : Make sure the certificate directory exits] ******************************************************************************* | |
Friday 29 December 2017 05:49:44 +0000 (0:00:00.312) 0:01:48.282 ******* | |
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "kube", "path": "/etc/kubernetes/ssl", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/secrets : Make sure the tokens directory exits] ************************************************************************************ | |
Friday 29 December 2017 05:49:44 +0000 (0:00:00.450) 0:01:48.733 ******* | |
ok: [node1] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node2] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0} | |
ok: [node3] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] *************************************************************** | |
Friday 29 December 2017 05:49:45 +0000 (0:00:00.448) 0:01:49.182 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] *************************************************************** | |
Friday 29 December 2017 05:49:45 +0000 (0:00:00.323) 0:01:49.506 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/secrets : Get_tokens | Make sure the tokens directory exits (on node1)] ************************************************************ | |
Friday 29 December 2017 05:49:45 +0000 (0:00:00.333) 0:01:49.839 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 999, "group": "kube-cert", "mode": "0750", "owner": "root", "path": "/etc/kubernetes/tokens", "size": 4096, "state": "directory", "uid": 0} | |
TASK [kubernetes/secrets : include] ***************************************************************************************************************** | |
Friday 29 December 2017 05:49:46 +0000 (0:00:00.322) 0:01:50.161 ******* | |
included: /home/ubuntu/kubespray/roles/kubernetes/secrets/tasks/gen_certs_script.yml for node2, node3, node1 | |
TASK [kubernetes/secrets : Gen_certs | Create kubernetes config directory (on node1)] *************************************************************** | |
Friday 29 December 2017 05:49:46 +0000 (0:00:00.151) 0:01:50.313 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/etc/kubernetes", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/secrets : Gen_certs | Create kubernetes script directory (on node1)] *************************************************************** | |
Friday 29 December 2017 05:49:46 +0000 (0:00:00.428) 0:01:50.742 ******* | |
ok: [node2 -> None] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "kube", "path": "/usr/local/bin/kubernetes-scripts", "size": 4096, "state": "directory", "uid": 999} | |
TASK [kubernetes/secrets : Gen_certs | write openssl config] **************************************************************************************** | |
Friday 29 December 2017 05:49:47 +0000 (0:00:00.417) 0:01:51.159 ******* | |
ok: [node2 -> None] => {"changed": false, "checksum": "af4239927b2fb01f7b1e15c60e2349694c20e149", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/kubernetes/openssl.conf", "size": 464, "state": "file", "uid": 0} | |
TASK [kubernetes/secrets : Gen_certs | copy certs generation script] ******************************************************************************** | |
Friday 29 December 2017 05:49:47 +0000 (0:00:00.674) 0:01:51.834 ******* | |
ok: [node2 -> None] => {"changed": false, "checksum": "ca132418c08e69827b1395da46c59957f462dea1", "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/usr/local/bin/kubernetes-scripts/make-ssl.sh", "size": 3601, "state": "file", "uid": 0} | |
TASK [kubernetes/secrets : Gen_certs | run cert generation script] ********************************************************************************** | |
Friday 29 December 2017 05:49:48 +0000 (0:00:00.549) 0:01:52.383 ******* | |
fatal: [node2 -> None]: FAILED! => {"changed": true, "cmd": ["/usr/local/bin/kubernetes-scripts/make-ssl.sh", "-f", "/etc/kubernetes/openssl.conf", "-d", "/etc/kubernetes/ssl"], "delta": "0:00:00.089545", "end": "2017-12-29 05:49:47.451046", "msg": "non-zero return code", "rc": 1, "start": "2017-12-29 05:49:47.361501", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} | |
NO MORE HOSTS LEFT ********************************************************************************************************************************** | |
to retry, use: --limit @/home/ubuntu/kubespray/cluster.retry | |
PLAY RECAP ****************************************************************************************************************************************** | |
node1 : ok=213 changed=0 unreachable=0 failed=0 | |
node2 : ok=204 changed=0 unreachable=0 failed=1 | |
node3 : ok=184 changed=0 unreachable=0 failed=0 | |
Friday 29 December 2017 05:49:48 +0000 (0:00:00.408) 0:01:52.792 ******* | |
=============================================================================== | |
kubernetes/secrets : Check certs | check if a cert already exists on node -------------------------------------------------------------------- 3.51s | |
kubernetes/preinstall : Create kubernetes directories ---------------------------------------------------------------------------------------- 1.37s | |
download : Download items -------------------------------------------------------------------------------------------------------------------- 1.23s | |
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.82s | |
kubernetes/preinstall : Stop if known booleans are set as strings (Use JSON format on CLI: -e "{'key': true }") ------------------------------ 0.79s | |
kubernetes/preinstall : Install latest version of python-apt for Debian distribs ------------------------------------------------------------- 0.73s | |
download : file_download | Download item ----------------------------------------------------------------------------------------------------- 0.73s | |
docker : ensure docker repository is enabled ------------------------------------------------------------------------------------------------- 0.70s | |
docker : Write docker.service systemd file --------------------------------------------------------------------------------------------------- 0.70s | |
docker : ensure docker packages are installed ------------------------------------------------------------------------------------------------ 0.70s | |
docker : Write docker options systemd drop-in ------------------------------------------------------------------------------------------------ 0.69s | |
docker : Write docker dns systemd drop-in ---------------------------------------------------------------------------------------------------- 0.69s | |
docker : ensure docker repository public key is installed ------------------------------------------------------------------------------------ 0.69s | |
kubernetes/secrets : Gen_certs | write openssl config ---------------------------------------------------------------------------------------- 0.67s | |
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.66s | |
kubernetes/preinstall : Install packages requirements ---------------------------------------------------------------------------------------- 0.66s | |
kubernetes/preinstall : Create cni directories ----------------------------------------------------------------------------------------------- 0.62s | |
download : Sync container -------------------------------------------------------------------------------------------------------------------- 0.62s | |
download : Download items -------------------------------------------------------------------------------------------------------------------- 0.60s | |
bootstrap-os : Assign inventory name to unconfigured hostnames (non-CoreOS) ------------------------------------------------------------------ 0.59s |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment