>>> kops: Building testing/kops 1.21.1-r4 (using abuild 3.9.0-r0) started Sun, 20 Mar 2022 08:30:36 +0000 >>> kops: Checking sanity of /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go (1/3) Installing kubernetes (1.23.5-r1) (2/3) Installing go (1.18-r0) (3/3) Installing .makedepends-kops (20220320.083037) Executing busybox-1.35.0-r5.trigger OK: 711 MiB in 102 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.21.1.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 11 26.1M 11 3040k 0 0 12.3M 0 0:00:02 --:--:-- 0:00:02 12.3M 100 26.1M 100 26.1M 0 0 46.0M 0 --:--:-- --:--:-- --:--:-- 46.0M >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.21.1.tar.gz >>> kops: Checking sha512sums... kops-1.21.1.tar.gz: OK cilium-builder-skip-test-without-sysfs.patch: OK fix-go1.18-segfault.patch: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.21.1.tar.gz... >>> kops: cilium-builder-skip-test-without-sysfs.patch patching file nodeup/pkg/model/networking/cilium_test.go >>> kops: fix-go1.18-segfault.patch patching file go.mod patching file go.sum /bin/sh: tools/get_version.sh: not found go build -ldflags=all="-X k8s.io/kops.Version= -X k8s.io/kops.GitVersion=v20220316-338-gfd6c4d191a " -o /home/buildozer/aports/testing/kops/src/kops-1.21.1/.build/local/kops k8s.io/kops/cmd/kops/ go: downloading github.com/spf13/cobra v1.1.3 go: downloading k8s.io/apimachinery v0.21.0 go: downloading k8s.io/cli-runtime v0.21.0 go: downloading helm.sh/helm/v3 v3.5.1 go: downloading k8s.io/api v0.21.0 go: downloading golang.org/x/crypto v0.0.0-20210513164829-c07d793c2f9a go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.0.2 go: downloading k8s.io/client-go v0.21.0 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/spf13/viper v1.7.1 go: downloading k8s.io/klog/v2 v2.8.0 go: downloading k8s.io/kubectl v0.21.0 go: downloading sigs.k8s.io/yaml v1.2.0 go: downloading github.com/aws/aws-sdk-go v1.38.29 go: downloading golang.org/x/net v0.0.0-20210525063256-abc453219eb5 go: downloading github.com/blang/semver v3.5.1+incompatible go: downloading k8s.io/klog v1.0.0 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/MakeNowJust/heredoc v0.0.0-20170808103936-bb23615498cd go: downloading github.com/Masterminds/sprig/v3 v3.2.2 go: downloading k8s.io/legacy-cloud-providers v0.21.0 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.13.0 go: downloading github.com/denverdino/aliyungo v0.0.0-20210425065611-55bee4942cba go: downloading github.com/go-ini/ini v1.62.0 go: downloading github.com/gophercloud/gophercloud v0.18.0 go: downloading github.com/hashicorp/vault/api v1.1.0 go: downloading github.com/pkg/sftp v1.13.0 go: downloading golang.org/x/oauth2 v0.0.0-20210514164344-f6687ab2804c go: downloading google.golang.org/api v0.45.0 go: downloading github.com/sergi/go-diff v1.2.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/fsnotify/fsnotify v1.4.9 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading github.com/magiconair/properties v1.8.1 go: downloading github.com/mitchellh/mapstructure v1.4.1 go: downloading github.com/pelletier/go-toml v1.9.0 go: downloading github.com/spf13/afero v1.2.2 go: downloading github.com/spf13/cast v1.3.1 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading github.com/subosito/gotenv v1.2.0 go: downloading gopkg.in/ini.v1 v1.62.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.0 go: downloading github.com/cpuguy83/go-md2man v1.0.10 go: downloading github.com/go-logr/logr v0.4.0 go: downloading github.com/digitalocean/godo v1.60.0 go: downloading github.com/aliyun/alibaba-cloud-sdk-go v1.61.1059 go: downloading github.com/Azure/azure-sdk-for-go v53.4.0+incompatible go: downloading github.com/Azure/go-autorest/autorest v0.11.18 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.7 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/google/uuid v1.2.0 go: downloading github.com/Masterminds/semver/v3 v3.1.1 go: downloading github.com/huandu/xstrings v1.3.1 go: downloading github.com/mitchellh/copystructure v1.0.0 go: downloading github.com/shopspring/decimal v1.2.0 go: downloading github.com/imdario/mergo v0.3.11 go: downloading github.com/evanphx/json-patch v4.9.0+incompatible go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/google/gofuzz v1.2.0 go: downloading k8s.io/kube-openapi v0.0.0-20210305001622-591a79e4bda7 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.1.0 go: downloading golang.org/x/sys v0.0.0-20210525143221-35b2ab0089ea go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/chai2010/gettext-go v0.0.0-20160711120539-c6fed771bfd5 go: downloading k8s.io/component-base v0.21.0 go: downloading k8s.io/utils v0.0.0-20210305010621-2afb4311ab10 go: downloading github.com/russross/blackfriday v1.5.2 go: downloading golang.org/x/term v0.0.0-20210220032956-6a3ed077a48d go: downloading github.com/spotinst/spotinst-sdk-go v1.85.0 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.21.0 go: downloading k8s.io/csi-translation-lib v0.21.0 go: downloading github.com/hashicorp/errwrap v1.0.0 go: downloading github.com/hashicorp/go-cleanhttp v0.5.1 go: downloading github.com/hashicorp/go-multierror v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.6.6 go: downloading github.com/hashicorp/go-rootcerts v1.0.2 go: downloading github.com/hashicorp/vault/sdk v0.1.14-0.20200519221838-e0cfd64bc267 go: downloading golang.org/x/time v0.0.0-20210220033141-f8bda1e9f3ba go: downloading gopkg.in/square/go-jose.v2 v2.5.1 go: downloading github.com/kr/fs v0.1.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading k8s.io/cloud-provider-openstack v1.21.0 go: downloading github.com/docker/docker v20.10.6+incompatible go: downloading github.com/hashicorp/hcl/v2 v2.10.0 go: downloading github.com/zclconf/go-cty v1.8.2 go: downloading github.com/golang/protobuf v1.5.2 go: downloading github.com/googleapis/gnostic v0.5.4 go: downloading golang.org/x/text v0.3.6 go: downloading github.com/russross/blackfriday/v2 v2.0.1 go: downloading github.com/google/go-querystring v1.0.0 go: downloading github.com/ghodss/yaml v1.0.0 go: downloading cloud.google.com/go v0.81.0 go: downloading github.com/gregjones/httpcache v0.0.0-20180305231024-9cad4c3443a7 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading sigs.k8s.io/kustomize/api v0.8.5 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/google/go-cmp v0.5.5 go: downloading github.com/mitchellh/reflectwalk v1.0.0 go: downloading github.com/mitchellh/go-wordwrap v1.0.0 go: downloading github.com/moby/term v0.0.0-20201216013528-df9cb8a40635 go: downloading github.com/go-openapi/spec v0.19.5 go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.13 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.2 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading github.com/prometheus/client_golang v1.10.0 go: downloading github.com/prometheus/client_model v0.2.0 go: downloading github.com/prometheus/procfs v0.6.0 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/shurcooL/sanitized_anchor_name v1.0.0 go: downloading google.golang.org/protobuf v1.26.0 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v0.0.0-20200415212048-7901bc822317 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/google/btree v1.0.0 go: downloading github.com/agext/levenshtein v1.2.1 go: downloading github.com/apparentlymart/go-textseg/v13 v13.0.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/containerd/containerd v1.4.4 go: downloading github.com/deislabs/oras v0.8.1 go: downloading github.com/apparentlymart/go-textseg v1.0.0 go: downloading github.com/docker/go-units v0.4.0 go: downloading github.com/gosuri/uitable v0.0.4 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/opencontainers/image-spec v1.0.1 go: downloading github.com/sirupsen/logrus v1.7.0 go: downloading gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/form3tech-oss/jwt-go v3.2.2+incompatible go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/go-openapi/jsonpointer v0.19.3 go: downloading github.com/go-openapi/jsonreference v0.19.3 go: downloading github.com/go-openapi/swag v0.19.5 go: downloading github.com/ryanuber/go-glob v1.0.0 go: downloading github.com/golang/snappy v0.0.1 go: downloading github.com/pierrec/lz4 v2.0.5+incompatible go: downloading github.com/hashicorp/go-version v1.2.0 go: downloading github.com/prometheus/common v0.18.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.1.1 go: downloading sigs.k8s.io/kustomize/kyaml v0.10.15 go: downloading github.com/cespare/xxhash v1.1.0 go: downloading github.com/docker/cli v0.0.0-20200130152716-5d0cf8839492 go: downloading golang.org/x/sync v0.0.0-20210220032951-036812b2e83c go: downloading github.com/fatih/color v1.7.0 go: downloading github.com/cyphar/filepath-securejoin v0.2.2 go: downloading github.com/xeipuuv/gojsonschema v1.2.0 go: downloading k8s.io/apiextensions-apiserver v0.21.0 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/docker/distribution v2.7.1+incompatible go: downloading github.com/PuerkitoBio/purell v1.1.1 go: downloading github.com/mailru/easyjson v0.7.0 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369 go: downloading google.golang.org/grpc v1.37.0 go: downloading github.com/mattn/go-colorable v0.1.4 go: downloading github.com/mattn/go-isatty v0.0.10 go: downloading github.com/mattn/go-runewidth v0.0.7 go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/morikuni/aec v1.0.0 go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20180127040702-4e3ac2762d5f go: downloading github.com/go-errors/errors v1.0.1 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/stretchr/testify v1.7.0 go: downloading github.com/xlab/treeprint v0.0.0-20181112141820-a009c3971eca go: downloading github.com/docker/docker-credential-helpers v0.6.3 go: downloading go.starlark.net v0.0.0-20200306205701-8dd3e2ee1dd5 go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-metrics v0.0.0-20180209012529-399ea8c73916 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading go.opencensus.io v0.23.0 go: downloading github.com/googleapis/gax-go/v2 v2.0.5 go: downloading google.golang.org/genproto v0.0.0-20210413151531-c14fb6ef47c3 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.0 go test -v ./... go: downloading github.com/jetstack/cert-manager v1.3.1 go: downloading sigs.k8s.io/controller-runtime v0.9.0-beta.0 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading k8s.io/mount-utils v0.21.0 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading k8s.io/gengo v0.0.0-20210203185629-de9496dff47b go: downloading github.com/hashicorp/memberlist v0.1.4 go: downloading github.com/oklog/ulid v1.3.1 go: downloading golang.org/x/tools v0.1.0 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/miekg/dns v1.1.35 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/armon/go-metrics v0.3.0 go: downloading github.com/hashicorp/go-immutable-radix v1.0.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.1.0 go: downloading golang.org/x/mod v0.4.2 go: downloading golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] === RUN Test_UnparseableVersion --- PASS: Test_UnparseableVersion (0.00s) PASS ok k8s.io/kops/channels/pkg/api 0.034s === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_UnparseableVersion --- PASS: Test_UnparseableVersion (0.00s) === RUN Test_MergeAddons --- PASS: Test_MergeAddons (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_InstallPKI I0320 08:32:27.693465 28140 addon.go:234] installing PKI for "test" I0320 08:32:28.232126 28140 addon.go:234] installing PKI for "test" --- PASS: Test_InstallPKI (1.01s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 1.113s ? k8s.io/kops/channels/pkg/cmd [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] === RUN TestCreateClusterMinimal I0320 08:32:45.117694 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.117773 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.117812 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.117862 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.117897 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.117913 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.117936 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.117966 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.117983 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.118029 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.118059 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.183771 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.183871 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.184208 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.217054 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.217114 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.217143 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.217182 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.217203 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.217229 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.217246 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.217268 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.217283 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.217313 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.217335 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.243465 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.243547 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.243836 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.249891 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.249925 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.249949 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.249977 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.250001 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.250016 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.250036 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.250061 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.250078 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.250105 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.250128 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.298238 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.298329 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.298615 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.304842 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.304878 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.304905 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.304935 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.304960 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.304975 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.304993 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.305012 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.305027 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.305055 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.305077 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.346185 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.346271 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.346542 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.353252 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.353290 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.353316 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.353344 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.353371 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.353389 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.353407 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.353429 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.353444 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.353473 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.353496 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.413401 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.413484 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.413772 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.425343 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.425391 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.425438 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.425484 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.425511 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.425534 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.425551 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.425573 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.425588 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.425620 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.425642 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.510608 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.510694 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.510974 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.40s) === RUN TestCreateClusterOverride I0320 08:32:45.517272 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.517307 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.517334 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.517362 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.517387 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.517404 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.517422 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.517444 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.517461 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.517491 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.517513 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.548852 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.549245 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.549502 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.04s) === RUN TestCreateClusterComplex I0320 08:32:45.559391 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.559450 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.559499 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.559554 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.559594 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.559621 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.559650 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.559681 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.559711 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.559761 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.559799 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.636389 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.636461 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.636716 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.08s) === RUN TestCreateClusterHA I0320 08:32:45.642916 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.642945 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.642968 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.642996 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.643019 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.643035 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.643050 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.643067 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.643082 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.643108 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.643129 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.676137 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.676196 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.676209 32017 subnets.go:180] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b I0320 08:32:45.676218 32017 subnets.go:180] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c I0320 08:32:45.676434 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.685432 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.685459 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.685482 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.685517 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.685541 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.685557 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.685572 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.685587 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.685599 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.685626 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.685647 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.752258 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.752352 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.752373 32017 subnets.go:180] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b I0320 08:32:45.752389 32017 subnets.go:180] Assigned CIDR 172.20.96.0/19 to subnet us-test-1c I0320 08:32:45.752826 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.12s) === RUN TestCreateClusterHAGCE I0320 08:32:45.766378 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.766413 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.766445 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.766477 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.766504 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.766524 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.766548 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.766572 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.766589 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.766621 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.766649 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0320 08:32:45.823548 32017 new_cluster.go:350] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:32:45.823567 32017 new_cluster.go:351] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:32:45.823646 32017 new_cluster.go:1011] Cloud Provider ID = gce --- PASS: TestCreateClusterHAGCE (0.07s) === RUN TestCreateClusterGCE I0320 08:32:45.834275 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.834312 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.834342 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.834371 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.834396 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.834414 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.834430 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.834448 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.834469 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.834497 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.834518 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.857546 32017 new_cluster.go:347] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0320 08:32:45.857597 32017 new_cluster.go:1011] Cloud Provider ID = gce --- PASS: TestCreateClusterGCE (0.03s) === RUN TestCreateClusterHASharedZone I0320 08:32:45.863909 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.863940 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.863965 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.863991 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.864012 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.864028 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.864043 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.864061 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.864084 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.864112 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.864133 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0320 08:32:45.906209 32017 new_cluster.go:708] Running with masters in the same AZs; redundancy will be reduced I0320 08:32:45.906259 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.906328 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.906602 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.05s) === RUN TestCreateClusterHASharedZones I0320 08:32:45.914605 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.914639 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.914666 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.914694 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.914717 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.914734 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.914754 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.914775 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.914790 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.914820 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:45.914841 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0320 08:32:45.988744 32017 new_cluster.go:708] Running with masters in the same AZs; redundancy will be reduced I0320 08:32:45.988826 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:45.988894 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:45.988919 32017 subnets.go:180] Assigned CIDR 172.20.64.0/19 to subnet us-test-1b I0320 08:32:45.989228 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.09s) === RUN TestCreateClusterPrivate I0320 08:32:46.000994 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.001024 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.001050 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.001084 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.001109 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.001128 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.001151 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.001176 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.001193 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.001221 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.001250 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.061565 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.061684 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:46.061708 32017 subnets.go:194] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a I0320 08:32:46.062174 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:46.062219 32017 utils.go:203] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.07s) === RUN TestCreateClusterPrivateGCE I0320 08:32:46.075401 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.075477 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.075512 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.075546 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.075576 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.075594 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.075613 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.075636 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.075655 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.075694 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.075720 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.142891 32017 new_cluster.go:347] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0320 08:32:46.142955 32017 new_cluster.go:1011] Cloud Provider ID = gce --- PASS: TestCreateClusterPrivateGCE (0.08s) === RUN TestCreateClusterWithNGWSpecified I0320 08:32:46.150847 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.150885 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.150910 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.150940 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.150967 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.150986 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.151003 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.151024 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.151040 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.151075 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.151097 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.174035 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.174103 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:46.174119 32017 subnets.go:194] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a I0320 08:32:46.174341 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:46.174370 32017 utils.go:203] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.03s) === RUN TestCreateClusterWithINGWSpecified I0320 08:32:46.183524 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.183557 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.183587 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.183621 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.183648 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.183666 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.183695 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.183716 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.183732 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.183764 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.183794 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.222643 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.222731 32017 subnets.go:180] Assigned CIDR 172.20.32.0/19 to subnet us-test-1a I0320 08:32:46.222750 32017 subnets.go:194] Assigned CIDR 172.20.0.0/22 to subnet utility-us-test-1a I0320 08:32:46.223071 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:46.223106 32017 utils.go:203] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.05s) === RUN TestCreateClusterSharedVPC I0320 08:32:46.230983 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.231018 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.231046 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.231084 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.231110 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.231132 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.231162 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.231184 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.231200 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.231239 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.231266 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.275567 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.275639 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.275698 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.275739 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.275763 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.275815 32017 subnets.go:180] Assigned CIDR 10.2.0.0/15 to subnet us-test-1a I0320 08:32:46.276094 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.05s) === RUN TestCreateClusterSharedSubnets I0320 08:32:46.282537 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.282570 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.282599 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.282639 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.282664 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.282683 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.282715 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.282739 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.282756 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.282796 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.282823 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.318605 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.318687 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.318822 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.318894 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.318925 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.319022 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.319087 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.319562 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.05s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0320 08:32:46.330325 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.330406 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.330468 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.330539 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.330599 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.330654 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.330704 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.330759 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.330805 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.330874 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.330928 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.361291 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0320 08:32:46.361347 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.361369 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.361433 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.361481 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.361498 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.361520 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.361535 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.361822 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.04s) === RUN TestCreateClusterPrivateSharedSubnets I0320 08:32:46.368527 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.368567 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.368595 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.368627 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.368653 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.368668 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.368687 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.368707 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.368723 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.368753 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.368803 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0320 08:32:46.388187 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.388236 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.388303 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.388323 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.388351 32017 new_cluster.go:1011] Cloud Provider ID = aws I0320 08:32:46.388395 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.388412 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.388433 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:32:46.388446 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0320 08:32:46.388751 32017 zones.go:91] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.03s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestMinimal I0320 08:32:46.395776 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:46.395823 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:46.395849 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:46.395881 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:46.395906 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:46.395921 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:46.395940 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:46.395962 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:46.395980 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:46.403367 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:46.404556 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:46.404636 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:49.300685 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:52.621216 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run W0320 08:32:52.621502 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:52.622766 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:52.623271 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:52.623343 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:52.623580 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:52.623846 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:52.626405 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:32:52.627617 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:52.627652 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:52.627779 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:52.627844 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:32:52.628879 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:52.629019 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:52.629072 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:32:52.629255 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:52.629270 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:52.660303 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:52.660753 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.660814 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:52.660835 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:52.661815 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.662138 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.662229 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.662279 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:52.662304 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:52.662331 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.663044 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:52.663089 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:52.663108 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:32:52.663737 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:52.664561 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:52.664793 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:52.670702 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:52.671698 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:52.671826 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:52.672392 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:52.709990 32017 target.go:107] Terraform output is in /tmp/test1027979927/out --- PASS: TestMinimal (6.32s) === RUN TestMinimalGCE I0320 08:32:52.712315 32017 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true W0320 08:32:53.150479 32017 external_access.go:36] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0320 08:32:53.150551 32017 firewall.go:35] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0320 08:32:53.150574 32017 firewall.go:64] Adding overlay network for X -> node rule - HACK W0320 08:32:53.150623 32017 firewall.go:118] Adding overlay network for X -> master rule - HACK W0320 08:32:53.150707 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups W0320 08:32:53.150744 32017 autoscalinggroup.go:156] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:32:53.150767 32017 autoscalinggroup.go:157] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:32:53.150787 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:53.150845 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:32:53.150867 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:53.157361 32017 executor.go:111] Tasks: 0 done / 55 total; 35 can run W0320 08:32:53.157820 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:53.157945 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:53.157972 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:53.157973 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:53.158019 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:53.158308 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:53.158436 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:53.158495 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:53.158502 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:53.158548 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:53.187564 32017 executor.go:111] Tasks: 35 done / 55 total; 16 can run I0320 08:32:53.187991 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:32:53.188037 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:32:53.211463 32017 executor.go:111] Tasks: 51 done / 55 total; 2 can run I0320 08:32:53.214651 32017 instancetemplate.go:550] adding csa: default I0320 08:32:53.218865 32017 instancetemplate.go:550] adding csa: default I0320 08:32:53.219028 32017 executor.go:111] Tasks: 53 done / 55 total; 2 can run I0320 08:32:53.219416 32017 executor.go:111] Tasks: 55 done / 55 total; 0 can run I0320 08:32:53.234640 32017 target.go:107] Terraform output is in /tmp/test2433505403/out --- PASS: TestMinimalGCE (0.52s) === RUN TestMinimalGCEPrivate I0320 08:32:53.236227 32017 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true W0320 08:32:53.434803 32017 external_access.go:36] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0320 08:32:53.434878 32017 firewall.go:35] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0320 08:32:53.434904 32017 firewall.go:64] Adding overlay network for X -> node rule - HACK W0320 08:32:53.434964 32017 firewall.go:118] Adding overlay network for X -> master rule - HACK W0320 08:32:53.435045 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups W0320 08:32:53.435086 32017 autoscalinggroup.go:156] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:32:53.435117 32017 autoscalinggroup.go:157] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:32:53.435143 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:53.435202 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:32:53.435227 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:53.440204 32017 executor.go:111] Tasks: 0 done / 56 total; 36 can run W0320 08:32:53.441350 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:53.441840 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:53.442043 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:53.442070 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:53.442223 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:53.442260 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:53.442311 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:53.442380 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:53.444079 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:53.444139 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:53.479309 32017 executor.go:111] Tasks: 36 done / 56 total; 16 can run I0320 08:32:53.479740 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:32:53.479852 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:32:53.516253 32017 executor.go:111] Tasks: 52 done / 56 total; 2 can run I0320 08:32:53.518658 32017 instancetemplate.go:550] adding csa: default I0320 08:32:53.520578 32017 instancetemplate.go:550] adding csa: default I0320 08:32:53.520693 32017 executor.go:111] Tasks: 54 done / 56 total; 2 can run I0320 08:32:53.520906 32017 executor.go:111] Tasks: 56 done / 56 total; 0 can run I0320 08:32:53.538040 32017 target.go:107] Terraform output is in /tmp/test1175983323/out --- PASS: TestMinimalGCEPrivate (0.30s) === RUN TestHA I0320 08:32:53.539770 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:53.539855 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:53.539903 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:53.539959 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:53.539998 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:53.540025 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:53.540054 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:53.540085 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:53.540114 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:53.553691 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:53.555891 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.555986 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.556048 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.556099 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.629651 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:53.742211 32017 executor.go:111] Tasks: 0 done / 95 total; 49 can run W0320 08:32:53.742544 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:53.742644 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:53.742632 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.ha.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:53.742880 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:53.742927 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:53.742993 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:53.743088 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:32:53.743163 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:53.743122 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:53.743226 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:53.743194 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:32:53.743276 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:53.742659 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:53.743300 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:53.743329 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:53.743344 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:53.743489 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:53.743539 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:53.770038 32017 executor.go:111] Tasks: 49 done / 95 total; 22 can run W0320 08:32:53.770347 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.770399 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/main" W0320 08:32:53.770418 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/events" W0320 08:32:53.770625 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.770882 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.771097 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.771274 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.771314 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/main" W0320 08:32:53.771337 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/events" W0320 08:32:53.771999 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/ha.example.com" for IAM policy builder W0320 08:32:53.772041 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/main" W0320 08:32:53.772059 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/ha.example.com/backups/etcd/events" I0320 08:32:53.772682 32017 executor.go:111] Tasks: 71 done / 95 total; 20 can run I0320 08:32:53.773005 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.773164 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.773339 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.773604 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.779075 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.781278 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.781395 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.782115 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:53.782258 32017 executor.go:111] Tasks: 91 done / 95 total; 4 can run I0320 08:32:53.782693 32017 executor.go:111] Tasks: 95 done / 95 total; 0 can run I0320 08:32:53.845138 32017 target.go:107] Terraform output is in /tmp/test518167560/out --- PASS: TestHA (0.31s) === RUN TestHighAvailabilityGCE I0320 08:32:53.847644 32017 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true W0320 08:32:54.050214 32017 external_access.go:36] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0320 08:32:54.050306 32017 firewall.go:35] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0320 08:32:54.050351 32017 firewall.go:64] Adding overlay network for X -> node rule - HACK W0320 08:32:54.050429 32017 firewall.go:118] Adding overlay network for X -> master rule - HACK W0320 08:32:54.050543 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups W0320 08:32:54.050603 32017 autoscalinggroup.go:156] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:32:54.050650 32017 autoscalinggroup.go:157] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:32:54.050688 32017 autoscalinggroup.go:161] gsa: default W0320 08:32:54.050772 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups I0320 08:32:54.050819 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:32:54.050859 32017 autoscalinggroup.go:161] gsa: default W0320 08:32:54.050933 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups I0320 08:32:54.050980 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:32:54.051020 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:54.051084 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:32:54.051121 32017 autoscalinggroup.go:161] gsa: default I0320 08:32:54.060253 32017 executor.go:111] Tasks: 0 done / 67 total; 39 can run I0320 08:32:54.060681 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:54.060881 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:54.060896 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:32:54.061163 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.061235 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:54.061350 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:32:54.061401 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.061424 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:54.061438 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:54.061473 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:54.096739 32017 executor.go:111] Tasks: 39 done / 67 total; 18 can run I0320 08:32:54.097073 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:32:54.097105 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:32:54.123262 32017 executor.go:111] Tasks: 57 done / 67 total; 4 can run I0320 08:32:54.125741 32017 instancetemplate.go:550] adding csa: default I0320 08:32:54.127116 32017 instancetemplate.go:550] adding csa: default I0320 08:32:54.127334 32017 instancetemplate.go:550] adding csa: default I0320 08:32:54.127367 32017 instancetemplate.go:550] adding csa: default I0320 08:32:54.127479 32017 executor.go:111] Tasks: 61 done / 67 total; 6 can run I0320 08:32:54.127750 32017 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0320 08:32:54.156620 32017 target.go:107] Terraform output is in /tmp/test957374431/out --- PASS: TestHighAvailabilityGCE (0.31s) === RUN TestComplex I0320 08:32:54.159117 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:54.159178 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:54.159227 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:54.159289 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:54.159328 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:54.159358 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:54.159388 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:54.159423 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:54.159450 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:54.176177 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.178809 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.178991 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.251875 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.361715 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run I0320 08:32:54.362203 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:54.362381 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:54.362429 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:54.362473 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:54.362428 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:32:54.362544 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:54.362555 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:32:54.362695 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.362716 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:54.362830 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:54.362843 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:54.362861 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:54.362871 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:54.362888 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:54.363059 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:54.391769 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run W0320 08:32:54.392285 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.392328 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.392368 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.392403 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" W0320 08:32:54.392563 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.392727 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.393499 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.393541 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.393560 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" W0320 08:32:54.394160 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.394207 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.394240 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:32:54.395101 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:32:54.395387 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.395746 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.397871 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.399386 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.399515 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:32:54.399953 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:32:54.465893 32017 target.go:107] Terraform output is in /tmp/test2328548816/out I0320 08:32:54.468695 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:54.468781 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:54.468852 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:54.468913 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:54.468955 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:54.468985 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:54.469016 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:54.469051 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:54.469080 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:54.482026 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.484599 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.484700 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.557813 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.664324 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run W0320 08:32:54.664712 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:54.664811 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.664837 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:54.664874 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:54.665066 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:54.665102 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:54.665104 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:32:54.665163 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:54.665110 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:54.666346 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:54.666560 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:54.665069 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:54.666975 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:54.667508 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:54.667552 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:54.697430 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run W0320 08:32:54.697864 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.698030 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.698119 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.698176 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.698165 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" W0320 08:32:54.699044 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.699092 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.699112 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:32:54.699986 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:32:54.700572 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.700835 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.704681 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.706476 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.706632 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:32:54.707006 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:32:54.712631 32017 target.go:169] Cloudformation output is in /tmp/test3812611631/out I0320 08:32:54.729724 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:54.729785 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:54.729833 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:54.729889 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:54.729930 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:54.729956 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:54.729985 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:54.730016 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:54.730042 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:54.742960 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.745588 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.745694 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.817899 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:54.937352 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run W0320 08:32:54.937842 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:54.938002 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.938086 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:54.938302 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:54.938468 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:32:54.938488 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:54.938533 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:54.938561 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:54.938471 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:54.938541 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:54.938660 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:54.938781 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:54.938811 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:54.938699 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:54.938858 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:54.972387 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run W0320 08:32:54.972789 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.972841 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.972862 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" W0320 08:32:54.972994 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.973235 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.973389 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.973654 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.973696 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.973715 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" W0320 08:32:54.974304 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:32:54.974340 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:32:54.974358 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:32:54.975002 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:32:54.975623 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.975855 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.982583 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.983259 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:54.983398 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:32:54.983932 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:32:55.043855 32017 target.go:107] Terraform output is in /tmp/test2247398666/out --- PASS: TestComplex (0.89s) === RUN TestCompress I0320 08:32:55.045882 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:55.045970 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:55.046018 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:55.046073 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:55.046117 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:55.046145 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:55.046176 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:55.046211 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:55.046242 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:55.055678 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.057809 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.057906 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.130290 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.240225 32017 executor.go:111] Tasks: 0 done / 78 total; 42 can run I0320 08:32:55.240514 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:55.240541 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:55.240637 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:55.240720 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:55.240836 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:55.240898 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:32:55.240995 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.241078 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:55.241184 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:55.241218 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:55.241274 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.241322 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:55.241460 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:55.241526 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:55.241598 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:55.268237 32017 executor.go:111] Tasks: 42 done / 78 total; 18 can run W0320 08:32:55.268459 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.268530 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/main" W0320 08:32:55.268554 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.268571 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/events" W0320 08:32:55.268780 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.268941 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.269371 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.269430 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/main" W0320 08:32:55.269520 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/events" W0320 08:32:55.270155 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/compress.example.com" for IAM policy builder W0320 08:32:55.270208 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/main" W0320 08:32:55.270242 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/compress.example.com/backups/etcd/events" I0320 08:32:55.270915 32017 executor.go:111] Tasks: 60 done / 78 total; 16 can run I0320 08:32:55.271322 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.271537 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.279940 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.283056 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.283186 32017 executor.go:111] Tasks: 76 done / 78 total; 2 can run I0320 08:32:55.283549 32017 executor.go:111] Tasks: 78 done / 78 total; 0 can run I0320 08:32:55.317597 32017 target.go:107] Terraform output is in /tmp/test3177652400/out --- PASS: TestCompress (0.27s) === RUN TestExternalPolicies I0320 08:32:55.319775 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:55.319858 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:55.319904 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:55.319957 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:55.319998 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:55.320025 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:55.320053 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:55.320086 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:55.320115 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:55.332923 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.336917 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.337029 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.410892 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.519533 32017 executor.go:111] Tasks: 0 done / 91 total; 45 can run W0320 08:32:55.519890 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:55.520007 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:55.520071 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:55.520142 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:55.520238 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:55.520222 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externalpolicies.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:55.520412 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.520514 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:55.520557 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:32:55.520575 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.520609 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:55.520625 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:55.520590 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:55.520668 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:55.520684 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:55.520561 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:55.554032 32017 executor.go:111] Tasks: 45 done / 91 total; 19 can run W0320 08:32:55.554568 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.555497 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.555524 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.555589 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/main" W0320 08:32:55.555628 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/events" W0320 08:32:55.555696 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.557322 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.557484 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/main" W0320 08:32:55.557509 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/events" W0320 08:32:55.558766 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externalpolicies.example.com" for IAM policy builder W0320 08:32:55.558806 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/main" W0320 08:32:55.558822 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externalpolicies.example.com/backups/etcd/events" I0320 08:32:55.559325 32017 executor.go:111] Tasks: 64 done / 91 total; 24 can run I0320 08:32:55.559685 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.559918 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.562166 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.563400 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.563515 32017 executor.go:111] Tasks: 88 done / 91 total; 3 can run I0320 08:32:55.563943 32017 executor.go:111] Tasks: 91 done / 91 total; 0 can run I0320 08:32:55.613335 32017 target.go:107] Terraform output is in /tmp/test3140765670/out --- PASS: TestExternalPolicies (0.30s) === RUN TestMinimalCloudformation I0320 08:32:55.615510 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:55.615574 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:55.615636 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:55.615689 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:55.615805 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:55.615833 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:55.615863 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:55.615898 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:55.615922 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:55.625346 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.627405 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.627502 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.700584 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.809645 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:32:55.810024 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:55.810096 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:55.810052 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:55.810139 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:55.810257 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:32:55.810347 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.810410 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:32:55.810457 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:55.810480 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:55.810584 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:55.810650 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:55.810755 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:32:55.810789 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:32:55.810670 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:55.810833 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:55.810806 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:55.810848 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:55.810774 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:55.810884 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0320 08:32:55.838853 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:55.839059 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:55.839106 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:55.839127 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:55.839133 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:55.839360 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:55.839950 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:55.839993 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:55.840014 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:32:55.840882 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:55.841325 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.841526 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.843445 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.845224 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.845353 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:55.845624 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:55.849862 32017 target.go:169] Cloudformation output is in /tmp/test134077960/out --- PASS: TestMinimalCloudformation (0.25s) === RUN TestMinimalEtcd I0320 08:32:55.862108 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:55.862164 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:55.862210 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:55.862260 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:55.862338 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:55.862365 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:55.862394 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:55.862424 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:55.862450 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:55.872540 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:55.874700 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.874789 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:55.947340 32017 zones.go:91] ListHostedZonesPages { } W0320 08:32:56.040226 32017 model.go:240] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0320 08:32:56.040296 32017 model.go:360] overriding log level in manifest (embedded etcd manifest), new level is 10 W0320 08:32:56.042307 32017 model.go:240] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0320 08:32:56.042485 32017 model.go:524] overloading ENV var in manifest (embedded etcd manifest) with ETCD_MANAGER_HOURLY_BACKUPS_RETENTION=1d W0320 08:32:56.042525 32017 model.go:524] overloading ENV var in manifest (embedded etcd manifest) with ETCD_MANAGER_DAILY_BACKUPS_RETENTION=30d I0320 08:32:56.056299 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run W0320 08:32:56.056707 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:56.056838 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.056864 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:56.056873 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:56.056868 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:56.056936 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-etcd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:56.057053 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key W0320 08:32:56.057064 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:56.057068 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-etcd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:56.056728 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:56.057196 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:56.059369 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:56.059422 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:56.059550 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:56.057181 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal-etcd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-etcd.example.com" },{ Key: "KubernetesCluster", Value: "minimal-etcd.example.com" },{ Key: "kubernetes.io/cluster/minimal-etcd.example.com", Value: "owned" }] }] } I0320 08:32:56.059754 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:56.059687 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:56.059842 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:56.059971 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:56.097619 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:56.097878 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-etcd.example.com" for IAM policy builder W0320 08:32:56.097953 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-etcd.example.com/backups/etcd/main" W0320 08:32:56.097990 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-etcd.example.com/backups/etcd/events" W0320 08:32:56.098153 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-etcd.example.com" for IAM policy builder W0320 08:32:56.098340 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-etcd.example.com" for IAM policy builder W0320 08:32:56.099089 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-etcd.example.com" for IAM policy builder W0320 08:32:56.099140 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-etcd.example.com/backups/etcd/main" W0320 08:32:56.099161 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-etcd.example.com/backups/etcd/events" I0320 08:32:56.100065 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:56.100527 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.100773 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.103491 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.105068 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.105206 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:56.105482 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:56.108789 32017 target.go:169] Cloudformation output is in /tmp/test1330656281/out --- PASS: TestMinimalEtcd (0.26s) === RUN TestMinimalGp3 I0320 08:32:56.120004 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:56.120055 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:56.120095 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:56.120142 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:56.120180 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:56.120207 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:56.120236 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:56.120267 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:56.120296 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:56.134894 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.136913 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.137007 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.209324 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.320145 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:32:56.320601 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:56.320850 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:32:56.320969 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:56.320972 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.321044 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:32:56.321081 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:56.321054 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:56.321077 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:32:56.321150 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.321165 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:56.321171 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:56.321180 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:56.321297 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:56.321317 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:56.321448 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:56.321476 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:56.350071 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:56.350470 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.350544 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.350576 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:56.350759 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.351171 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.351335 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.351940 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.352466 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.352491 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:56.353867 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.353962 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.353994 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:32:56.356251 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:56.356556 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.356784 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.358834 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.360747 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.360868 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:56.361196 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:56.398362 32017 target.go:107] Terraform output is in /tmp/test1233191818/out I0320 08:32:56.400683 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:56.400968 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:56.401094 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:56.401179 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:56.401241 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:56.401306 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:56.401368 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:56.401442 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:56.401514 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:56.413067 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.415215 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.415310 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.488053 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.596928 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:32:56.597477 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:32:56.597518 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:56.597663 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:56.597490 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:56.597747 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:56.597816 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:56.597863 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:56.597925 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:56.597751 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:56.597670 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.598012 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:56.598035 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:32:56.597823 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:32:56.598019 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:56.597526 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:56.598171 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:56.598297 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:56.598401 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:56.598390 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0320 08:32:56.628483 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:56.629578 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.630024 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.630102 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.630127 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:56.630437 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.631351 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.631421 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.631457 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:32:56.634286 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:56.634601 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.634874 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.637415 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.638913 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.639042 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:56.639320 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:56.642354 32017 target.go:169] Cloudformation output is in /tmp/test2405343333/out --- PASS: TestMinimalGp3 (0.53s) === RUN TestExistingIAMCloudformation I0320 08:32:56.652920 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:56.652972 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:56.653014 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:56.653062 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:56.653142 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:56.653170 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:56.653199 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:56.653231 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:56.653260 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:56.662592 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.664594 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.664690 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.737981 32017 zones.go:91] ListHostedZonesPages { } W0320 08:32:56.834733 32017 task.go:121] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"masters"}, lifecycle ExistsAndWarnIfChanges W0320 08:32:56.835081 32017 task.go:121] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","containerRuntime":"containerd","kubernetesVersion":"1.21.0","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://clusters.example.com/minimal.example.com/backups/etcd/main"}},{"name":"events","provider":"Manager","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://clusters.example.com/minimal.example.com/backups/etcd/events"}}],"containerd":{"configOverride":"version = 2\n\n[plugins]\n\n [plugins.\"io.containerd.grpc.v1.cri\"]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\n runtime_type = \"io.containerd.runc.v2\"\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n","logLevel":"info","version":"1.4.9"},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.21.0","logLevel":2,"cloudProvider":"aws","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"AlwaysAllow","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"serviceAccountIssuer":"https://api.internal.minimal.example.com","serviceAccountJWKSURI":"https://api.internal.minimal.example.com/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.21.0","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.21.0","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.21.0","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"cloudConfig":{"manageStorageClasses":true,"awsEBSCSIDriver":{"enabled":false}},"networking":{"cni":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":false}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":{},"UseServiceAccountIAM":false},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":null,"DNSName":null,"ZoneID":null,"Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}, lifecycle ExistsAndWarnIfChanges W0320 08:32:56.835562 32017 task.go:121] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-master-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-master-role","Lifecycle":"Sync","Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"masters"}}, lifecycle ExistsAndWarnIfChanges W0320 08:32:56.835748 32017 task.go:121] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"nodes"}, lifecycle ExistsAndWarnIfChanges W0320 08:32:56.835802 32017 task.go:121] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"minimal.example.com","creationTimestamp":"2016-12-10T22:42:27Z"},"spec":{"channel":"stable","configBase":"memfs://clusters.example.com/minimal.example.com","cloudProvider":"aws","containerRuntime":"containerd","kubernetesVersion":"1.21.0","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"}],"masterPublicName":"api.minimal.example.com","masterInternalName":"api.internal.minimal.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://clusters.example.com/minimal.example.com/secrets","keyStore":"memfs://clusters.example.com/minimal.example.com/pki","configStore":"memfs://clusters.example.com/minimal.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://clusters.example.com/minimal.example.com/backups/etcd/main"}},{"name":"events","provider":"Manager","etcdMembers":[{"name":"us-test-1a","instanceGroup":"master-us-test-1a"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://clusters.example.com/minimal.example.com/backups/etcd/events"}}],"containerd":{"configOverride":"version = 2\n\n[plugins]\n\n [plugins.\"io.containerd.grpc.v1.cri\"]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\n runtime_type = \"io.containerd.runc.v2\"\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n","logLevel":"info","version":"1.4.9"},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.21.0","logLevel":2,"cloudProvider":"aws","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":1,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"AlwaysAllow","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"serviceAccountIssuer":"https://api.internal.minimal.example.com","serviceAccountJWKSURI":"https://api.internal.minimal.example.com/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.21.0","cloudProvider":"aws","clusterName":"minimal.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.21.0","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.21.0","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"cloudConfig":{"manageStorageClasses":true,"awsEBSCSIDriver":{"enabled":false}},"networking":{"cni":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":false}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":{},"UseServiceAccountIAM":false},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":null,"DNSName":null,"ZoneID":null,"Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}, lifecycle ExistsAndWarnIfChanges W0320 08:32:56.836023 32017 task.go:121] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-node-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-node-role","Lifecycle":"Sync","Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"minimal.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/minimal.example.com":"owned"},"ExportWithID":"nodes"}}, lifecycle ExistsAndWarnIfChanges I0320 08:32:56.845555 32017 executor.go:111] Tasks: 0 done / 75 total; 43 can run I0320 08:32:56.845932 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:56.846083 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:56.846085 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:56.846196 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:56.846141 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:56.846251 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:56.846347 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:56.846371 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:56.846544 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:56.847878 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:56.848528 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:56.848610 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:32:56.848721 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:32:56.848824 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:56.848753 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:56.848994 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.848992 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } W0320 08:32:56.849254 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:56.849294 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:56.883793 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:32:56.883825 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. I0320 08:32:56.883853 32017 executor.go:111] Tasks: 43 done / 75 total; 14 can run W0320 08:32:56.884218 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.884292 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:32:56.884327 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:32:56.884402 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:32:56.885043 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:32:56.885066 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:32:56.885079 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:32:56.885090 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. I0320 08:32:56.885114 32017 executor.go:111] Tasks: 57 done / 75 total; 16 can run I0320 08:32:56.885487 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.885708 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.887835 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.889307 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.889446 32017 executor.go:111] Tasks: 73 done / 75 total; 2 can run I0320 08:32:56.889707 32017 executor.go:111] Tasks: 75 done / 75 total; 0 can run I0320 08:32:56.892314 32017 target.go:169] Cloudformation output is in /tmp/test513018867/out --- PASS: TestExistingIAMCloudformation (0.25s) === RUN TestExistingSG I0320 08:32:56.901959 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:56.902036 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:56.902077 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:56.902144 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:56.902185 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:56.902212 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:56.902239 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:56.902270 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:56.902298 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:56.916680 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:56.918846 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.918932 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.918987 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.919038 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:56.993342 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.111666 32017 executor.go:111] Tasks: 0 done / 127 total; 49 can run W0320 08:32:57.111898 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:57.112051 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:57.112104 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:57.112299 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:57.112454 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:57.112473 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:57.112499 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:57.112521 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:57.112483 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.existingsg.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:57.112692 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:57.112627 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:57.112791 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:57.112873 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:57.112923 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:57.112892 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:57.112970 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:57.112997 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:57.112932 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:57.148051 32017 executor.go:111] Tasks: 49 done / 127 total; 25 can run W0320 08:32:57.148302 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.148607 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.148845 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.148877 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.148920 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/main" W0320 08:32:57.148959 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/events" W0320 08:32:57.149784 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.149827 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/main" W0320 08:32:57.149891 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/events" W0320 08:32:57.150508 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/existingsg.example.com" for IAM policy builder W0320 08:32:57.150544 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/main" W0320 08:32:57.150563 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/existingsg.example.com/backups/etcd/events" I0320 08:32:57.151223 32017 executor.go:111] Tasks: 74 done / 127 total; 48 can run I0320 08:32:57.151489 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.151880 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.152201 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.152444 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.159423 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.160047 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.160596 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.160963 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.161095 32017 executor.go:111] Tasks: 122 done / 127 total; 5 can run I0320 08:32:57.161554 32017 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0320 08:32:57.241719 32017 target.go:107] Terraform output is in /tmp/test832943594/out --- PASS: TestExistingSG (0.34s) === RUN TestBastionAdditionalUserData I0320 08:32:57.244276 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:57.244363 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:57.244413 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:57.244467 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:57.244509 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:57.244536 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:57.244565 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:57.244599 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:57.244625 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:57.256927 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.259205 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.259296 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.259355 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.332157 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.437897 32017 executor.go:111] Tasks: 0 done / 109 total; 47 can run W0320 08:32:57.438944 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:57.439153 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:57.439185 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:57.439310 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:32:57.439424 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:57.439583 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:57.440092 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:57.440329 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:57.440372 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:57.440409 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:57.440370 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.bastionuserdata.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:57.440460 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:57.440627 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:57.440712 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:57.440738 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:57.440834 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:57.441178 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:57.482087 32017 executor.go:111] Tasks: 47 done / 109 total; 28 can run W0320 08:32:57.482469 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.482529 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/main" W0320 08:32:57.482550 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/events" W0320 08:32:57.482602 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.482809 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.482975 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.483386 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.483432 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/main" W0320 08:32:57.483451 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/events" W0320 08:32:57.484059 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/bastionuserdata.example.com" for IAM policy builder W0320 08:32:57.484096 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/main" W0320 08:32:57.484114 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/bastionuserdata.example.com/backups/etcd/events" I0320 08:32:57.484753 32017 executor.go:111] Tasks: 75 done / 109 total; 28 can run I0320 08:32:57.485381 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.485601 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.485690 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.485915 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.488109 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.489424 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.489557 32017 executor.go:111] Tasks: 103 done / 109 total; 5 can run I0320 08:32:57.490024 32017 executor.go:111] Tasks: 108 done / 109 total; 1 can run I0320 08:32:57.490201 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0320 08:32:57.554756 32017 target.go:107] Terraform output is in /tmp/test821499685/out --- PASS: TestBastionAdditionalUserData (0.31s) === RUN TestMinimalJSON I0320 08:32:57.557237 32017 featureflag.go:165] FeatureFlag "TerraformJSON"=true I0320 08:32:57.557437 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:57.557525 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:57.557572 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:57.557625 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:57.557667 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:57.557695 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:57.557725 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:57.557759 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:57.557786 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:57.567211 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.569266 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.569360 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.641642 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.747194 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run W0320 08:32:57.748896 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:57.748963 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:57.749118 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:57.749217 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:57.749257 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:57.749399 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:57.747693 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:57.750229 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:57.750520 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:57.750585 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:57.750492 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-json.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:57.750566 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:57.750766 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:57.751136 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:32:57.751226 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:57.751439 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:57.781228 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:32:57.781736 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.781905 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.781995 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/main" W0320 08:32:57.782031 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.782041 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/events" W0320 08:32:57.782369 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.783151 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.783247 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/main" W0320 08:32:57.783269 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/events" W0320 08:32:57.783885 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal-json.example.com" for IAM policy builder W0320 08:32:57.783927 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/main" W0320 08:32:57.783946 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal-json.example.com/backups/etcd/events" I0320 08:32:57.784545 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:32:57.785003 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.785126 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.787279 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.789072 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.789191 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:32:57.789542 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:32:57.793819 32017 target.go:107] Terraform output is in /tmp/test1469421872/out I0320 08:32:57.795613 32017 featureflag.go:165] FeatureFlag "TerraformJSON"=false --- PASS: TestMinimalJSON (0.24s) === RUN TestPrivateWeave I0320 08:32:57.795884 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:57.795956 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:57.795996 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:57.796049 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:57.796087 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:57.796114 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:57.796142 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:57.796172 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:57.796199 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:57.811106 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:57.813721 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.813820 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.813880 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:57.887102 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:58.021597 32017 executor.go:111] Tasks: 0 done / 108 total; 47 can run W0320 08:32:58.021936 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:58.022018 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:58.022052 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:58.022078 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:58.022200 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:58.022241 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privateweave.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:58.023112 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.023311 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:58.022294 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:58.023560 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:58.023881 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:58.024927 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:58.025173 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.025394 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:58.025455 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:58.025599 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:58.025651 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:58.051263 32017 executor.go:111] Tasks: 47 done / 108 total; 27 can run W0320 08:32:58.051708 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.051761 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.051844 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/main" W0320 08:32:58.051885 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/events" W0320 08:32:58.051917 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.052077 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.052903 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.052949 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/main" W0320 08:32:58.052969 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/events" W0320 08:32:58.053568 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateweave.example.com" for IAM policy builder W0320 08:32:58.053607 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/main" W0320 08:32:58.053626 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateweave.example.com/backups/etcd/events" I0320 08:32:58.054255 32017 executor.go:111] Tasks: 74 done / 108 total; 28 can run I0320 08:32:58.054751 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.054905 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.055125 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.055285 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.056969 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.058730 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.058878 32017 executor.go:111] Tasks: 102 done / 108 total; 5 can run I0320 08:32:58.059261 32017 executor.go:111] Tasks: 107 done / 108 total; 1 can run I0320 08:32:58.059451 32017 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0320 08:32:58.120037 32017 target.go:107] Terraform output is in /tmp/test662428586/out --- PASS: TestPrivateWeave (0.33s) === RUN TestPrivateFlannel I0320 08:32:58.122748 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:58.122840 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:58.122890 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:58.122949 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:58.122992 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:58.123019 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:58.123047 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:58.123081 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:58.123109 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:58.138108 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:58.140304 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.140397 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.140463 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.214465 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:58.342855 32017 executor.go:111] Tasks: 0 done / 108 total; 47 can run W0320 08:32:58.343224 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.343246 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:58.343405 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:58.343520 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:58.343603 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:58.343192 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privateflannel.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:58.343801 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:58.344688 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:58.345170 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:58.345496 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:58.345738 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:58.345903 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:58.345931 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:58.346054 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:58.346149 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.343707 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:58.347042 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:58.378213 32017 executor.go:111] Tasks: 47 done / 108 total; 27 can run W0320 08:32:58.378777 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.378840 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.378894 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/main" W0320 08:32:58.378918 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/events" W0320 08:32:58.379048 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.379263 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.379674 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.379720 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/main" W0320 08:32:58.379740 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/events" W0320 08:32:58.380330 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateflannel.example.com" for IAM policy builder W0320 08:32:58.380371 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/main" W0320 08:32:58.380391 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateflannel.example.com/backups/etcd/events" I0320 08:32:58.381016 32017 executor.go:111] Tasks: 74 done / 108 total; 28 can run I0320 08:32:58.381382 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.381616 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.381741 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.381920 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.384162 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.385516 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.385655 32017 executor.go:111] Tasks: 102 done / 108 total; 5 can run I0320 08:32:58.386195 32017 executor.go:111] Tasks: 107 done / 108 total; 1 can run I0320 08:32:58.386387 32017 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0320 08:32:58.449125 32017 target.go:107] Terraform output is in /tmp/test1184631234/out --- PASS: TestPrivateFlannel (0.33s) === RUN TestPrivateCalico I0320 08:32:58.451561 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:58.451626 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:58.451678 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:58.451733 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:58.451775 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:58.451802 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:58.451834 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:58.451869 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:58.451898 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:58.463455 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:58.465681 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.465779 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.465838 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.537807 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:58.914108 32017 executor.go:111] Tasks: 0 done / 110 total; 48 can run I0320 08:32:58.914422 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:58.914480 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:58.914607 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:58.914616 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:32:58.914446 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:58.914718 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:58.914733 32017 vfs_castore.go:612] CA private key was not found W0320 08:32:58.914778 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.914789 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:58.914889 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:58.915000 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:58.915005 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:32:58.914749 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:58.915250 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:58.915335 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:32:58.915385 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:58.915250 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:58.948942 32017 executor.go:111] Tasks: 48 done / 110 total; 27 can run W0320 08:32:58.949420 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.950385 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.950514 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:32:58.950570 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" W0320 08:32:58.951206 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.951400 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.952174 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.952279 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:32:58.952325 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" W0320 08:32:58.954706 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:58.954763 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:32:58.954787 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" I0320 08:32:58.955507 32017 executor.go:111] Tasks: 75 done / 110 total; 29 can run I0320 08:32:58.955916 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.956124 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.956293 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.956366 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.958497 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.959667 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:58.959806 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:32:58.960304 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:32:58.960476 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:32:59.020068 32017 target.go:107] Terraform output is in /tmp/test2653232324/out I0320 08:32:59.022284 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:59.022346 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:59.022397 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:59.022450 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:59.022492 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:59.022519 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:59.022548 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:59.022578 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:59.022607 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:59.034156 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:59.036426 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.036524 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.036583 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.108632 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:59.491355 32017 executor.go:111] Tasks: 0 done / 110 total; 48 can run W0320 08:32:59.491667 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:59.491864 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:32:59.491916 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:59.491911 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:59.492022 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:32:59.491876 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:59.492116 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:59.492206 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:59.492349 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:59.492369 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:59.492408 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:59.492206 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:32:59.492497 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:59.492535 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:32:59.492546 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key W0320 08:32:59.492551 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:32:59.492572 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:59.492562 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:32:59.492559 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:59.492650 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0320 08:32:59.528966 32017 executor.go:111] Tasks: 48 done / 110 total; 27 can run W0320 08:32:59.529509 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:59.529572 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:32:59.529593 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" W0320 08:32:59.529935 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:59.530189 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:59.530308 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:32:59.530351 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:32:59.530370 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" I0320 08:32:59.531319 32017 executor.go:111] Tasks: 75 done / 110 total; 29 can run I0320 08:32:59.531725 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.532045 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.532171 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.532395 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.539214 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.540955 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.541120 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:32:59.541554 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:32:59.541719 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:32:59.546376 32017 target.go:169] Cloudformation output is in /tmp/test733094990/out --- PASS: TestPrivateCalico (1.11s) === RUN TestPrivateCilium I0320 08:32:59.560194 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:59.560247 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:59.560293 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:59.560341 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:59.560380 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:59.560408 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:59.560439 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:59.560472 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:59.560499 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:59.571755 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:59.573854 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.573938 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.573992 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.646239 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:59.798554 32017 executor.go:111] Tasks: 0 done / 108 total; 47 can run W0320 08:32:59.798844 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:59.799023 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:32:59.799050 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:32:59.799059 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:32:59.799201 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:32:59.799336 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:32:59.799416 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:32:59.799419 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:32:59.799474 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:32:59.799507 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:32:59.799532 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:32:59.799379 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:59.799668 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:32:59.799688 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:32:59.799781 32017 vfs_castore.go:612] CA private key was not found I0320 08:32:59.799815 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:32:59.799864 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:32:59.839084 32017 executor.go:111] Tasks: 47 done / 108 total; 27 can run W0320 08:32:59.839421 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.839477 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:32:59.839500 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" W0320 08:32:59.839730 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.839912 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.840060 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.840271 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.840313 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:32:59.840331 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" W0320 08:32:59.840947 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:32:59.840983 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:32:59.841001 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" I0320 08:32:59.841638 32017 executor.go:111] Tasks: 74 done / 108 total; 28 can run I0320 08:32:59.842149 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.842281 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.842468 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.843412 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.847976 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.849764 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.849902 32017 executor.go:111] Tasks: 102 done / 108 total; 5 can run I0320 08:32:59.850430 32017 executor.go:111] Tasks: 107 done / 108 total; 1 can run I0320 08:32:59.850599 32017 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0320 08:32:59.910867 32017 target.go:107] Terraform output is in /tmp/test2384875431/out I0320 08:32:59.913055 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:59.913121 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:59.913173 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:59.913230 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:59.913272 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:59.913299 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:59.913328 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:59.913360 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:59.913388 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:59.924948 32017 zones.go:91] ListHostedZonesPages { } I0320 08:32:59.927278 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.927378 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:32:59.927439 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.001810 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:00.151912 32017 executor.go:111] Tasks: 0 done / 108 total; 47 can run W0320 08:33:00.152268 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:00.152306 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:00.153573 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:00.153662 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:00.153745 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:00.153791 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:00.153819 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:00.153968 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:00.153996 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:00.154047 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:00.154050 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:00.154295 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:00.154308 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:00.152341 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:00.154326 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:00.154434 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:00.154479 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecilium.example.com" },{ Key: "KubernetesCluster", Value: "privatecilium.example.com" },{ Key: "kubernetes.io/cluster/privatecilium.example.com", Value: "owned" }] }] } I0320 08:33:00.154846 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:00.156008 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:00.156408 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:00.192033 32017 executor.go:111] Tasks: 47 done / 108 total; 27 can run W0320 08:33:00.192770 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:00.192834 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:00.192828 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:00.192855 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" W0320 08:33:00.193111 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:00.193742 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:00.193783 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:00.193802 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" I0320 08:33:00.194691 32017 executor.go:111] Tasks: 74 done / 108 total; 28 can run I0320 08:33:00.195015 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.195138 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.195380 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.195533 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.197636 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.199693 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.199871 32017 executor.go:111] Tasks: 102 done / 108 total; 5 can run I0320 08:33:00.200509 32017 executor.go:111] Tasks: 107 done / 108 total; 1 can run I0320 08:33:00.200688 32017 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0320 08:33:00.204962 32017 target.go:169] Cloudformation output is in /tmp/test3444995996/out --- PASS: TestPrivateCilium (0.66s) === RUN TestPrivateCilium2 I0320 08:33:00.218806 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:00.218862 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:00.218904 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:00.218958 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:00.218999 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:00.219025 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:00.219053 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:00.219085 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:00.219112 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:00.234990 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.18.0 ********************************************************************************* I0320 08:33:00.237736 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.237827 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:00.237885 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.179471 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:01.327616 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run I0320 08:33:01.327943 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:01.328218 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:01.328285 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:01.328309 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:01.328334 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:01.328346 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:01.328385 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:33:01.328411 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:01.328413 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:01.328486 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:01.328693 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:01.328723 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:01.328753 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:01.328792 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:01.328844 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:01.328862 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:01.328910 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:01.358135 32017 executor.go:111] Tasks: 47 done / 110 total; 29 can run W0320 08:33:01.358533 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.358576 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.358628 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:01.358652 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" I0320 08:33:01.358831 32017 keypair.go:195] Issuing new certificate: "kube-proxy" W0320 08:33:01.358983 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.359136 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder I0320 08:33:01.359140 32017 keypair.go:195] Issuing new certificate: "kubelet" W0320 08:33:01.359360 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.359401 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:01.359464 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" W0320 08:33:01.360059 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.360095 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:01.360114 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" I0320 08:33:01.388122 32017 executor.go:111] Tasks: 76 done / 110 total; 28 can run I0320 08:33:01.388638 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.388865 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.389035 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.389117 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.393498 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.396069 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.396208 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:33:01.396594 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:33:01.396757 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:01.458396 32017 target.go:107] Terraform output is in /tmp/test2769105757/out I0320 08:33:01.460660 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:01.460723 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:01.460773 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:01.460830 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:01.460873 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:01.460900 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:01.460930 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:01.460966 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:01.460994 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:01.472509 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.18.0 ********************************************************************************* I0320 08:33:01.474870 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.474960 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.475021 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.551483 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:01.694960 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run W0320 08:33:01.695264 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:01.695320 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:01.695416 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:01.695463 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:01.695597 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:01.695654 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:01.695621 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:01.695792 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:01.695821 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:01.695855 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:01.695759 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privatecilium.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecilium.example.com" },{ Key: "KubernetesCluster", Value: "privatecilium.example.com" },{ Key: "kubernetes.io/cluster/privatecilium.example.com", Value: "owned" }] }] } W0320 08:33:01.695890 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:01.695939 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:01.695659 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:01.696046 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:01.695888 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:01.696097 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:01.696113 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:01.696125 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:01.696201 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:01.732031 32017 executor.go:111] Tasks: 47 done / 110 total; 29 can run I0320 08:33:01.732399 32017 keypair.go:195] Issuing new certificate: "kube-proxy" W0320 08:33:01.732423 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.732622 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder I0320 08:33:01.732634 32017 keypair.go:195] Issuing new certificate: "kubelet" W0320 08:33:01.732820 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.732913 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:01.732951 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" W0320 08:33:01.733741 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecilium.example.com" for IAM policy builder W0320 08:33:01.733789 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/main" W0320 08:33:01.733809 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecilium.example.com/backups/etcd/events" I0320 08:33:01.746997 32017 executor.go:111] Tasks: 76 done / 110 total; 28 can run I0320 08:33:01.747420 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.747676 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.747944 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.748680 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.752833 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.755039 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.755205 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:33:01.755740 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:33:01.755941 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:01.760104 32017 target.go:169] Cloudformation output is in /tmp/test1502712931/out --- PASS: TestPrivateCilium2 (1.55s) === RUN TestPrivateCiliumAdvanced I0320 08:33:01.773739 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:01.773794 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:01.773839 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:01.773892 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:01.773930 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:01.773957 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:01.773986 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:01.774020 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:01.774047 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:01.786362 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:01.788729 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.788852 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.788913 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:01.861443 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.016241 32017 executor.go:111] Tasks: 0 done / 114 total; 53 can run I0320 08:33:02.016653 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:02.016706 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:02.016740 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privateciliumadvanced.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:02.016910 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:02.016949 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:02.016979 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:33:02.017060 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:02.017074 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:02.017106 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:02.017110 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:02.017212 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca-cilium" W0320 08:33:02.017305 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:02.017135 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-cilium" I0320 08:33:02.017455 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:02.017503 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:02.017562 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-cilium" W0320 08:33:02.017461 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:02.017646 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:02.017458 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:02.017594 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:02.051182 32017 executor.go:111] Tasks: 53 done / 114 total; 27 can run W0320 08:33:02.051605 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.051667 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main" W0320 08:33:02.051689 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events" W0320 08:33:02.051707 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium" W0320 08:33:02.051859 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.052075 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.052295 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.052591 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.052637 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main" W0320 08:33:02.052656 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events" W0320 08:33:02.052673 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium" W0320 08:33:02.053349 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.053390 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main" W0320 08:33:02.053409 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events" W0320 08:33:02.053426 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium" I0320 08:33:02.054099 32017 executor.go:111] Tasks: 80 done / 114 total; 28 can run I0320 08:33:02.054417 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.054536 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.054763 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.054945 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.056619 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.058586 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.058715 32017 executor.go:111] Tasks: 108 done / 114 total; 5 can run I0320 08:33:02.059204 32017 executor.go:111] Tasks: 113 done / 114 total; 1 can run I0320 08:33:02.059374 32017 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0320 08:33:02.126206 32017 target.go:107] Terraform output is in /tmp/test3468650557/out I0320 08:33:02.128444 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:02.128511 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:02.128560 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:02.128614 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:02.128655 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:02.128683 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:02.128714 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:02.128750 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:02.128803 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:02.141106 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.143558 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.143654 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.143712 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.215360 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.368932 32017 executor.go:111] Tasks: 0 done / 114 total; 53 can run I0320 08:33:02.369253 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" W0320 08:33:02.369359 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:02.369290 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:02.369395 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:02.369258 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-cilium" W0320 08:33:02.369467 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:02.369564 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:02.369587 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:02.369731 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-cilium" I0320 08:33:02.369804 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:02.369837 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:02.369799 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privateciliumadvanced.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:02.369896 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca-cilium" W0320 08:33:02.369984 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:02.369737 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:02.370009 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privateciliumadvanced.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:02.369908 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:02.370154 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:02.370161 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privateciliumadvanced.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privateciliumadvanced.example.com" },{ Key: "KubernetesCluster", Value: "privateciliumadvanced.example.com" },{ Key: "kubernetes.io/cluster/privateciliumadvanced.example.com", Value: "owned" }] }] } I0320 08:33:02.370374 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:02.370510 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:02.370524 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:02.370588 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:02.414687 32017 executor.go:111] Tasks: 53 done / 114 total; 27 can run W0320 08:33:02.414888 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.415082 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.415448 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.415527 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main" W0320 08:33:02.415560 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events" W0320 08:33:02.415582 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium" W0320 08:33:02.416309 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privateciliumadvanced.example.com" for IAM policy builder W0320 08:33:02.416353 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/main" W0320 08:33:02.416417 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/events" W0320 08:33:02.416438 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privateciliumadvanced.example.com/backups/etcd/cilium" I0320 08:33:02.417357 32017 executor.go:111] Tasks: 80 done / 114 total; 28 can run I0320 08:33:02.417856 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.418067 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.418217 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.418303 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.420527 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.421743 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.421895 32017 executor.go:111] Tasks: 108 done / 114 total; 5 can run I0320 08:33:02.422318 32017 executor.go:111] Tasks: 113 done / 114 total; 1 can run I0320 08:33:02.422470 32017 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0320 08:33:02.426682 32017 target.go:169] Cloudformation output is in /tmp/test2011810635/out --- PASS: TestPrivateCiliumAdvanced (0.67s) === RUN TestPrivateCanal I0320 08:33:02.442706 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:02.442787 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:02.442835 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:02.442888 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:02.442929 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:02.442955 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:02.442983 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:02.443014 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:02.443041 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:02.455147 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.457285 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.457376 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.457435 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.530158 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.783675 32017 executor.go:111] Tasks: 0 done / 110 total; 49 can run W0320 08:33:02.785282 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:02.785356 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:02.785497 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:02.785537 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:02.785584 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:02.785637 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:02.785738 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:02.785739 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:02.785665 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:02.785861 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:02.785850 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecanal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:02.786436 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:02.785596 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:02.786704 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:02.785760 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:02.784213 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:02.787002 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:02.825302 32017 executor.go:111] Tasks: 49 done / 110 total; 27 can run W0320 08:33:02.825659 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.825717 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/main" W0320 08:33:02.825739 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/events" W0320 08:33:02.825795 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.826090 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.826297 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.826607 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.826652 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/main" W0320 08:33:02.826672 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/events" W0320 08:33:02.827265 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecanal.example.com" for IAM policy builder W0320 08:33:02.827306 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/main" W0320 08:33:02.827325 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecanal.example.com/backups/etcd/events" I0320 08:33:02.827990 32017 executor.go:111] Tasks: 76 done / 110 total; 28 can run I0320 08:33:02.828476 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.828643 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.828913 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.829120 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.830697 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.832412 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:02.832540 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:33:02.833003 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:33:02.833169 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:02.900236 32017 target.go:107] Terraform output is in /tmp/test2950309309/out --- PASS: TestPrivateCanal (0.46s) === RUN TestPrivateKopeio I0320 08:33:02.902615 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:02.902698 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:02.902746 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:02.902799 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:02.902841 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:02.902870 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:02.902900 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:02.902934 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:02.902962 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:02.915242 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:02.917521 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:02.917613 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:02.917671 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:02.992812 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.128213 32017 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0320 08:33:03.130055 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:03.130089 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:03.130153 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:03.130267 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:03.130430 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:03.130560 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:03.130637 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:03.130659 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:03.130669 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:03.130787 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:03.130813 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:03.130824 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:03.130440 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:03.130869 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:03.131030 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:03.131175 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:03.131291 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:03.160191 32017 executor.go:111] Tasks: 47 done / 114 total; 30 can run W0320 08:33:03.160818 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.160926 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.160975 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" W0320 08:33:03.161001 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" W0320 08:33:03.161037 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.161199 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.161767 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.161808 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" W0320 08:33:03.161827 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" W0320 08:33:03.162481 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:03.162520 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" W0320 08:33:03.162539 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" I0320 08:33:03.163230 32017 executor.go:111] Tasks: 77 done / 114 total; 31 can run I0320 08:33:03.163712 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.163946 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.164219 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.164418 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.166121 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.167827 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.167947 32017 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0320 08:33:03.168429 32017 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0320 08:33:03.238414 32017 target.go:107] Terraform output is in /tmp/test2197445127/out --- PASS: TestPrivateKopeio (0.34s) === RUN TestUnmanaged I0320 08:33:03.240829 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:03.240922 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:03.240973 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:03.241027 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:03.241071 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:03.241097 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:03.241125 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:03.241160 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:03.241186 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:03.254155 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.256429 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.256531 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.256594 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.328800 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.436685 32017 executor.go:111] Tasks: 0 done / 98 total; 45 can run I0320 08:33:03.436942 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:03.436969 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:03.437061 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:03.437035 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:03.437191 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:03.437240 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:03.437257 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:03.437303 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:03.437392 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:03.437470 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:03.437506 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:03.437562 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:03.437582 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.unmanaged.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:03.437688 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:03.437255 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:03.437914 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:03.437944 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:03.479311 32017 executor.go:111] Tasks: 45 done / 98 total; 25 can run W0320 08:33:03.479678 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.479809 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.479864 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/main" W0320 08:33:03.479885 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/events" W0320 08:33:03.479931 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.480172 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.480587 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.480628 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/main" W0320 08:33:03.480690 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/events" W0320 08:33:03.481282 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/unmanaged.example.com" for IAM policy builder W0320 08:33:03.481318 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/main" W0320 08:33:03.481336 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/unmanaged.example.com/backups/etcd/events" I0320 08:33:03.481977 32017 executor.go:111] Tasks: 70 done / 98 total; 24 can run I0320 08:33:03.482380 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.482638 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.482903 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.483077 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.484664 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.486443 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.486563 32017 executor.go:111] Tasks: 94 done / 98 total; 4 can run I0320 08:33:03.487098 32017 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0320 08:33:03.544642 32017 target.go:107] Terraform output is in /tmp/test2869678760/out --- PASS: TestUnmanaged (0.31s) === RUN TestPrivateSharedSubnet I0320 08:33:03.547864 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:03.548006 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:03.548108 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:03.548229 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:03.548315 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:03.548369 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:03.548440 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:03.548506 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:03.548560 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:03.561632 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.563897 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.564001 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.564061 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.635556 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.744487 32017 executor.go:111] Tasks: 0 done / 97 total; 45 can run I0320 08:33:03.744869 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:03.744937 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:03.745149 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:03.745149 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:03.745144 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:03.745317 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:03.745330 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:03.745350 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:03.745407 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:03.745361 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:03.745530 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:03.745579 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:03.745602 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:03.745696 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:03.745693 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:03.745708 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:03.745948 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:03.774299 32017 executor.go:111] Tasks: 45 done / 97 total; 24 can run W0320 08:33:03.774784 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:03.774705 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:03.775047 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:03.775148 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:03.775241 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:03.775275 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:03.775298 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" W0320 08:33:03.776165 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:03.776215 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:03.776281 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" W0320 08:33:03.776895 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:03.776935 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:03.776954 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" I0320 08:33:03.777580 32017 executor.go:111] Tasks: 69 done / 97 total; 24 can run I0320 08:33:03.777859 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.778042 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.778108 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.778370 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.784067 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.785731 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.785861 32017 executor.go:111] Tasks: 93 done / 97 total; 4 can run I0320 08:33:03.786361 32017 executor.go:111] Tasks: 97 done / 97 total; 0 can run I0320 08:33:03.840157 32017 target.go:107] Terraform output is in /tmp/test3855740609/out --- PASS: TestPrivateSharedSubnet (0.29s) === RUN TestPrivateSharedIP I0320 08:33:03.842495 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:03.842550 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:03.842596 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:03.842644 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:03.842684 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:03.842711 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:03.842739 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:03.842769 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:03.842801 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:03.854876 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:03.857097 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.857190 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.857250 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:03.930718 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:04.039991 32017 executor.go:111] Tasks: 0 done / 105 total; 45 can run I0320 08:33:04.040469 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:04.040499 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:04.040580 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:04.040698 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.040710 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:04.040741 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:04.040826 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:04.040827 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.040986 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:04.041003 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.041058 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:04.041087 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:04.041158 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.040985 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:04.041135 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:04.041121 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.041186 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:04.078493 32017 executor.go:111] Tasks: 45 done / 105 total; 26 can run I0320 08:33:04.078824 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:04.078933 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.079118 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.079175 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.079236 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:04.079267 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" W0320 08:33:04.079275 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.080053 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.080099 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:04.080118 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" W0320 08:33:04.081682 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.081780 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:04.081805 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" I0320 08:33:04.083348 32017 executor.go:111] Tasks: 71 done / 105 total; 28 can run I0320 08:33:04.083894 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.084542 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.084723 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.085472 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.088714 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.090395 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.090542 32017 executor.go:111] Tasks: 99 done / 105 total; 5 can run I0320 08:33:04.091030 32017 executor.go:111] Tasks: 104 done / 105 total; 1 can run I0320 08:33:04.091224 32017 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0320 08:33:04.152267 32017 target.go:107] Terraform output is in /tmp/test3277138523/out I0320 08:33:04.154926 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:04.154987 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:04.155035 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:04.155086 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:04.155127 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:04.155153 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:04.155181 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:04.155213 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:04.155241 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:04.166936 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:04.169131 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.169226 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.169290 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.241831 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:04.353428 32017 executor.go:111] Tasks: 0 done / 105 total; 45 can run I0320 08:33:04.353954 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:04.353986 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.354009 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:04.354088 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.354115 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:04.354256 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:04.354271 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:04.354353 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:04.354315 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:04.354412 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse W0320 08:33:04.354279 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:04.354282 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:04.354454 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:04.354262 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:04.355563 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:04.354548 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:04.356134 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:04.356233 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:04.356260 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:04.356411 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0320 08:33:04.393261 32017 executor.go:111] Tasks: 45 done / 105 total; 26 can run W0320 08:33:04.393850 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:04.393849 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:04.393999 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.394052 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.394084 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:04.394122 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" W0320 08:33:04.394945 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:04.394988 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:04.395008 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" I0320 08:33:04.395907 32017 executor.go:111] Tasks: 71 done / 105 total; 28 can run I0320 08:33:04.396255 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.396443 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.396665 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.396807 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.398636 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.400079 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:04.400257 32017 executor.go:111] Tasks: 99 done / 105 total; 5 can run I0320 08:33:04.400896 32017 executor.go:111] Tasks: 104 done / 105 total; 1 can run I0320 08:33:04.401191 32017 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0320 08:33:04.405120 32017 target.go:169] Cloudformation output is in /tmp/test1333928824/out --- PASS: TestPrivateSharedIP (0.58s) === RUN TestPrivateDns1 I0320 08:33:04.418440 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:04.418517 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:04.418560 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:04.418608 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:04.418647 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:04.418675 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:04.418703 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:04.418734 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:04.418785 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:04.432506 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.432595 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.432656 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.505305 32017 dns.go:97] Private DNS: skipping DNS validation I0320 08:33:04.634472 32017 executor.go:111] Tasks: 0 done / 108 total; 46 can run I0320 08:33:04.634802 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:04.634952 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:04.635001 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:04.635109 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:04.635129 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.635170 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:04.635323 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.635472 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:04.635517 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:04.635503 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatedns1.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:04.635553 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.635693 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:04.635720 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:04.635729 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:04.664557 32017 executor.go:111] Tasks: 46 done / 108 total; 23 can run I0320 08:33:04.664934 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "internal.example.com" I0320 08:33:04.664975 32017 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0320 08:33:04.665062 32017 dnszone.go:250] Existing zone "internal.example.com." found; will configure TF to reuse I0320 08:33:04.665079 32017 dnszone.go:273] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0320 08:33:04.665269 32017 executor.go:111] Tasks: 69 done / 108 total; 29 can run I0320 08:33:04.665632 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.665830 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder W0320 08:33:04.665898 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/main" W0320 08:33:04.665938 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/events" W0320 08:33:04.665944 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder I0320 08:33:04.665863 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.666177 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder W0320 08:33:04.666350 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder W0320 08:33:04.667633 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder W0320 08:33:04.667708 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/main" W0320 08:33:04.667807 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/events" W0320 08:33:04.669046 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns1.example.com" for IAM policy builder W0320 08:33:04.669267 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/main" W0320 08:33:04.669380 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns1.example.com/backups/etcd/events" I0320 08:33:04.671624 32017 executor.go:111] Tasks: 98 done / 108 total; 5 can run I0320 08:33:04.672210 32017 executor.go:111] Tasks: 103 done / 108 total; 3 can run I0320 08:33:04.672391 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.672559 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.673585 32017 api.go:53] PageSize not implemented W0320 08:33:04.673627 32017 bootstrapscript.go:84] Task did not have an address: *awstasks.ClassicLoadBalancer {"Name":"api.privatedns1.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns1-example-c-lq96ht","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns1.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"AssociateExtraCIDRBlocks":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"utility-us-test-1a.privatedns1.example.com","Owner":"John Doe","SubnetType":"Utility","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns1.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api-elb.privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api.privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"ForAPIServer":true,"Shared":null} W0320 08:33:04.674848 32017 api.go:53] PageSize not implemented W0320 08:33:04.674879 32017 bootstrapscript.go:84] Task did not have an address: *awstasks.ClassicLoadBalancer {"Name":"api.privatedns1.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns1-example-c-lq96ht","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns1.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"AssociateExtraCIDRBlocks":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"utility-us-test-1a.privatedns1.example.com","Owner":"John Doe","SubnetType":"Utility","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns1.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns1.example.com","Lifecycle":"Sync","ID":null,"CIDR":"172.20.0.0/16","EnableDNSHostnames":true,"EnableDNSSupport":true,"Shared":false,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api-elb.privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns1.example.com","Name":"api.privatedns1.example.com","Owner":"John Doe","foo/bar":"fib+baz","kubernetes.io/cluster/privatedns1.example.com":"owned"},"ForAPIServer":true,"Shared":null} I0320 08:33:04.675155 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.676416 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.676542 32017 executor.go:111] Tasks: 106 done / 108 total; 2 can run I0320 08:33:04.676868 32017 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0320 08:33:04.746626 32017 target.go:107] Terraform output is in /tmp/test4254886016/out --- PASS: TestPrivateDns1 (0.33s) === RUN TestPrivateDns2 I0320 08:33:04.749158 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:04.749252 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:04.749304 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:04.749361 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:04.749404 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:04.749432 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:04.749465 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:04.749499 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:04.749529 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:04.764130 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.764236 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.764300 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.836585 32017 dns.go:97] Private DNS: skipping DNS validation I0320 08:33:04.938647 32017 executor.go:111] Tasks: 0 done / 105 total; 44 can run W0320 08:33:04.938932 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.939034 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:04.939249 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:04.939383 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:04.939403 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:04.939590 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.939605 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:04.939665 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:04.939650 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatedns2.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:04.939614 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:04.939681 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:04.939832 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:04.939848 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:04.939880 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:04.966300 32017 executor.go:111] Tasks: 44 done / 105 total; 22 can run I0320 08:33:04.966683 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "private.example.com" I0320 08:33:04.966705 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:04.966723 32017 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0320 08:33:04.966811 32017 dnszone.go:250] Existing zone "private.example.com." found; will configure TF to reuse I0320 08:33:04.966834 32017 dnszone.go:264] VPC "vpc-12345678" already associated with zone "private.example.com." I0320 08:33:04.967012 32017 executor.go:111] Tasks: 66 done / 105 total; 29 can run W0320 08:33:04.967275 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.967316 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.967533 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.967699 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.967331 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/main" I0320 08:33:04.967706 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.967803 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/events" I0320 08:33:04.967866 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.968548 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.968595 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/main" W0320 08:33:04.968675 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/events" W0320 08:33:04.969423 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatedns2.example.com" for IAM policy builder W0320 08:33:04.969492 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/main" W0320 08:33:04.969527 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatedns2.example.com/backups/etcd/events" I0320 08:33:04.970285 32017 executor.go:111] Tasks: 95 done / 105 total; 5 can run I0320 08:33:04.970956 32017 executor.go:111] Tasks: 100 done / 105 total; 3 can run I0320 08:33:04.971217 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.971469 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } W0320 08:33:04.974661 32017 api.go:53] PageSize not implemented W0320 08:33:04.974713 32017 bootstrapscript.go:84] Task did not have an address: *awstasks.ClassicLoadBalancer {"Name":"api.privatedns2.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns2-example-c-6jft30","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns2.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":null,"EnableDNSSupport":true,"Shared":true,"Tags":null,"AssociateExtraCIDRBlocks":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"utility-us-test-1a.privatedns2.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns2.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns2.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":null,"EnableDNSSupport":true,"Shared":true,"Tags":null,"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api-elb.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"},"ForAPIServer":true,"Shared":null} W0320 08:33:04.977862 32017 api.go:53] PageSize not implemented W0320 08:33:04.977900 32017 bootstrapscript.go:84] Task did not have an address: *awstasks.ClassicLoadBalancer {"Name":"api.privatedns2.example.com","Lifecycle":"Sync","LoadBalancerName":"api-privatedns2-example-c-6jft30","DNSName":null,"HostedZoneId":null,"Subnets":[{"Name":"utility-us-test-1a.privatedns2.example.com","ShortName":"utility-us-test-1a","Lifecycle":"Sync","ID":null,"VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":null,"EnableDNSSupport":true,"Shared":true,"Tags":null,"AssociateExtraCIDRBlocks":null},"AvailabilityZone":"us-test-1a","CIDR":"172.20.4.0/22","Shared":false,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"utility-us-test-1a.privatedns2.example.com","SubnetType":"Utility","kubernetes.io/cluster/privatedns2.example.com":"owned","kubernetes.io/role/elb":"1"}}],"SecurityGroups":[{"Name":"api-elb.privatedns2.example.com","Lifecycle":"Sync","ID":null,"Description":"Security group for api ELB","VPC":{"Name":"privatedns2.example.com","Lifecycle":"Sync","ID":"vpc-12345678","CIDR":"172.20.0.0/16","EnableDNSHostnames":null,"EnableDNSSupport":true,"Shared":true,"Tags":null,"AssociateExtraCIDRBlocks":null},"RemoveExtraRules":["port=443"],"Shared":null,"Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api-elb.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"}}],"Listeners":{"443":{"InstancePort":443,"SSLCertificateID":""}},"Scheme":null,"HealthCheck":{"Target":"SSL:443","HealthyThreshold":2,"UnhealthyThreshold":2,"Interval":10,"Timeout":5},"AccessLog":null,"ConnectionDraining":null,"ConnectionSettings":{"IdleTimeout":300},"CrossZoneLoadBalancing":{"Enabled":false},"SSLCertificateID":"","Tags":{"KubernetesCluster":"privatedns2.example.com","Name":"api.privatedns2.example.com","kubernetes.io/cluster/privatedns2.example.com":"owned"},"ForAPIServer":true,"Shared":null} I0320 08:33:04.977968 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.979497 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:04.979638 32017 executor.go:111] Tasks: 103 done / 105 total; 2 can run I0320 08:33:04.980027 32017 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0320 08:33:05.037527 32017 target.go:107] Terraform output is in /tmp/test2942489576/out --- PASS: TestPrivateDns2 (0.29s) === RUN TestDiscoveryFeatureGate I0320 08:33:05.039697 32017 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=true I0320 08:33:05.039896 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:05.039982 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:05.040031 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:05.040082 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:05.040123 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:05.040149 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:05.040180 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:05.040216 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:05.040241 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:05.048357 32017 create_secret_keypair_ca.go:141] using user provided cert: ../../tests/integration/update_cluster/public-jwks-apiserver/ca.crt I0320 08:33:05.048388 32017 create_secret_keypair_ca.go:142] using user provided private key: ../../tests/integration/update_cluster/public-jwks-apiserver/ca.key I0320 08:33:05.052419 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.19.10 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.19.10 ********************************************************************************* I0320 08:33:05.054635 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.054722 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.565257 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:05.677284 32017 executor.go:111] Tasks: 0 done / 84 total; 46 can run I0320 08:33:05.677695 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:05.677918 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:05.678053 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:05.678166 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:05.678094 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:05.678220 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:05.678235 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:05.678215 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:05.678343 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:05.678222 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:05.678364 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:05.678558 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:05.678691 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:05.716240 32017 executor.go:111] Tasks: 46 done / 84 total; 20 can run W0320 08:33:05.716570 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.716619 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.716646 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:05.716810 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.717093 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.717351 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.717509 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.717555 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.717574 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:05.718136 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.718173 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.718191 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:05.718701 32017 executor.go:111] Tasks: 66 done / 84 total; 16 can run I0320 08:33:05.719022 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.719244 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.721541 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.722890 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.723014 32017 executor.go:111] Tasks: 82 done / 84 total; 2 can run I0320 08:33:05.723340 32017 executor.go:111] Tasks: 84 done / 84 total; 0 can run I0320 08:33:05.768308 32017 target.go:107] Terraform output is in /tmp/test3233141972/out I0320 08:33:05.770408 32017 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=false --- PASS: TestDiscoveryFeatureGate (0.73s) === RUN TestVFSServiceAccountIssuerDiscovery I0320 08:33:05.770717 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:05.770806 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:05.770857 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:05.770911 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:05.770955 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:05.770982 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:05.771010 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:05.771041 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:05.771069 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:05.779163 32017 create_secret_keypair_ca.go:141] using user provided cert: ../../tests/integration/update_cluster/vfs-said/ca.crt I0320 08:33:05.779196 32017 create_secret_keypair_ca.go:142] using user provided private key: ../../tests/integration/update_cluster/vfs-said/ca.key I0320 08:33:05.783155 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:05.785406 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.785533 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:05.858063 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:05.964219 32017 executor.go:111] Tasks: 0 done / 82 total; 45 can run I0320 08:33:05.964493 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:05.964649 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:05.964756 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:05.964705 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:05.964853 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:05.964988 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:05.965178 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:05.965215 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:05.965232 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:05.965247 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:05.965302 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:05.965454 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:05.965460 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:05.997108 32017 executor.go:111] Tasks: 45 done / 82 total; 19 can run W0320 08:33:05.997503 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.997565 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.997586 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:05.997731 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.997967 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.998139 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.998326 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.998370 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.998389 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:05.999068 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:05.999110 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:05.999128 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:05.999735 32017 executor.go:111] Tasks: 64 done / 82 total; 16 can run I0320 08:33:06.000205 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.000414 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.002428 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.004198 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.004315 32017 executor.go:111] Tasks: 80 done / 82 total; 2 can run I0320 08:33:06.004678 32017 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0320 08:33:06.046787 32017 target.go:107] Terraform output is in /tmp/test1753355753/out --- PASS: TestVFSServiceAccountIssuerDiscovery (0.28s) === RUN TestAWSLBController I0320 08:33:06.048659 32017 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=true I0320 08:33:06.048885 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:06.048973 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:06.049024 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:06.049075 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:06.049115 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:06.049142 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:06.049171 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:06.049208 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:06.049234 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:06.057334 32017 create_secret_keypair_ca.go:141] using user provided cert: ../../tests/integration/update_cluster/aws-lb-controller/ca.crt I0320 08:33:06.057366 32017 create_secret_keypair_ca.go:142] using user provided private key: ../../tests/integration/update_cluster/aws-lb-controller/ca.key I0320 08:33:06.061292 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:06.063447 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.063544 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:06.136073 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.341271 32017 executor.go:111] Tasks: 0 done / 88 total; 49 can run I0320 08:33:07.341706 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:07.341715 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:07.342637 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:07.343511 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:07.343981 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:07.344463 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:07.345177 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:07.347706 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:07.347849 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:07.347737 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:07.347907 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:07.347906 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:07.348001 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:07.381090 32017 executor.go:111] Tasks: 49 done / 88 total; 21 can run W0320 08:33:07.381427 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.381616 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.381775 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.382023 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.382134 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:07.382163 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:07.382893 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.382937 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:07.382956 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:07.383454 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:07.383492 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:07.383511 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:07.384047 32017 executor.go:111] Tasks: 70 done / 88 total; 16 can run I0320 08:33:07.384323 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.384562 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.386855 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.388501 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.388621 32017 executor.go:111] Tasks: 86 done / 88 total; 2 can run I0320 08:33:07.388948 32017 executor.go:111] Tasks: 88 done / 88 total; 0 can run I0320 08:33:07.429770 32017 target.go:107] Terraform output is in /tmp/test2644731099/out I0320 08:33:07.432032 32017 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=false --- PASS: TestAWSLBController (1.38s) === RUN TestSharedSubnet I0320 08:33:07.432356 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:07.432445 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:07.432495 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:07.432550 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:07.432592 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:07.432619 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:07.432648 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:07.432682 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:07.432709 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:07.442337 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.444430 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.444527 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.516135 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.622714 32017 executor.go:111] Tasks: 0 done / 74 total; 42 can run I0320 08:33:07.622975 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:07.623011 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:07.623137 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:07.623290 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:07.623377 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:07.623542 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:07.623557 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:07.623379 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:07.623304 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:07.623700 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:07.623730 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:07.623735 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:07.623767 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:07.623842 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:07.623870 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:07.623912 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:07.659832 32017 executor.go:111] Tasks: 42 done / 74 total; 16 can run W0320 08:33:07.660075 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:07.660106 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:07.660279 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:07.660292 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:07.660344 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:07.660365 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" W0320 08:33:07.660440 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:07.661095 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:07.661143 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:07.661206 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" W0320 08:33:07.661824 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:07.661863 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:07.661881 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" I0320 08:33:07.662523 32017 executor.go:111] Tasks: 58 done / 74 total; 14 can run I0320 08:33:07.662859 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.662978 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.667278 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.670446 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.670588 32017 executor.go:111] Tasks: 72 done / 74 total; 2 can run I0320 08:33:07.670972 32017 executor.go:111] Tasks: 74 done / 74 total; 0 can run I0320 08:33:07.704005 32017 target.go:107] Terraform output is in /tmp/test101670943/out --- PASS: TestSharedSubnet (0.27s) === RUN TestSharedVPC I0320 08:33:07.706008 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:07.706089 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:07.706150 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:07.706204 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:07.706246 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:07.706272 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:07.706300 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:07.706332 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:07.706359 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:07.715736 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.717725 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.717817 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.789707 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.894449 32017 executor.go:111] Tasks: 0 done / 77 total; 42 can run I0320 08:33:07.894775 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:07.894977 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:07.895088 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:07.895211 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:07.895238 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:07.895254 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:33:07.895326 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:07.895327 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:07.895289 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:07.895407 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:07.895418 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:07.895311 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:07.895677 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:07.895745 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:07.895762 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:07.895843 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:07.922019 32017 executor.go:111] Tasks: 42 done / 77 total; 17 can run W0320 08:33:07.922413 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.922472 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" W0320 08:33:07.922495 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" I0320 08:33:07.922453 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:07.922417 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.922807 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.922970 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.923212 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.923252 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" W0320 08:33:07.923317 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" W0320 08:33:07.923909 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:07.923943 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" W0320 08:33:07.923962 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" I0320 08:33:07.924553 32017 executor.go:111] Tasks: 59 done / 77 total; 16 can run I0320 08:33:07.925002 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.925266 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.929214 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.933445 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:07.933577 32017 executor.go:111] Tasks: 75 done / 77 total; 2 can run I0320 08:33:07.933926 32017 executor.go:111] Tasks: 77 done / 77 total; 0 can run I0320 08:33:07.967993 32017 target.go:107] Terraform output is in /tmp/test4282705778/out --- PASS: TestSharedVPC (0.26s) === RUN TestExistingIAM I0320 08:33:07.970064 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:07.970144 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:07.970190 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:07.970246 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:07.970287 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:07.970313 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:07.970342 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:07.970373 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:07.970402 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:07.984815 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:07.987116 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:07.987214 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:07.987274 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:07.987331 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.060831 32017 zones.go:91] ListHostedZonesPages { } W0320 08:33:08.157110 32017 task.go:121] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"masters"}, lifecycle ExistsAndWarnIfChanges W0320 08:33:08.157217 32017 task.go:121] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-master-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"masters"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"existing-iam.example.com","creationTimestamp":"2017-01-01T00:00:00Z"},"spec":{"channel":"stable","configBase":"memfs://tests/existing-iam.example.com","cloudProvider":"aws","containerRuntime":"containerd","kubernetesVersion":"1.21.0","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"},{"name":"us-test-1b","cidr":"172.20.64.0/19","zone":"us-test-1b","type":"Public"},{"name":"us-test-1c","cidr":"172.20.96.0/19","zone":"us-test-1c","type":"Public"}],"masterPublicName":"api.existing-iam.example.com","masterInternalName":"api.internal.existing-iam.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://tests/existing-iam.example.com/secrets","keyStore":"memfs://tests/existing-iam.example.com/pki","configStore":"memfs://tests/existing-iam.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-test-1a"},{"name":"b","instanceGroup":"master-us-test-1b"},{"name":"c","instanceGroup":"master-us-test-1c"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://tests/existing-iam.example.com/backups/etcd/main"}},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-test-1a"},{"name":"b","instanceGroup":"master-us-test-1b"},{"name":"c","instanceGroup":"master-us-test-1c"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://tests/existing-iam.example.com/backups/etcd/events"}}],"containerd":{"configOverride":"version = 2\n\n[plugins]\n\n [plugins.\"io.containerd.grpc.v1.cri\"]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\n runtime_type = \"io.containerd.runc.v2\"\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n","logLevel":"info","version":"1.4.9"},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.21.0","logLevel":2,"cloudProvider":"aws","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":3,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"AlwaysAllow","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"serviceAccountIssuer":"https://api.internal.existing-iam.example.com","serviceAccountJWKSURI":"https://api.internal.existing-iam.example.com/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.21.0","cloudProvider":"aws","clusterName":"existing-iam.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.21.0","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.21.0","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"cloudConfig":{"manageStorageClasses":true,"awsEBSCSIDriver":{"enabled":false}},"networking":{"cni":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":false}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":{},"UseServiceAccountIAM":false},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":null,"DNSName":null,"ZoneID":null,"Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}, lifecycle ExistsAndWarnIfChanges W0320 08:33:08.157587 32017 task.go:121] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-master-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-master-role","Lifecycle":"Sync","Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-master-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-master-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"masters"}}, lifecycle ExistsAndWarnIfChanges W0320 08:33:08.157734 32017 task.go:121] overriding task *awstasks.IAMRole {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"nodes"}, lifecycle ExistsAndWarnIfChanges W0320 08:33:08.157799 32017 task.go:121] overriding task *awstasks.IAMRolePolicy {"ID":null,"Lifecycle":"Sync","Name":"kops-custom-node-role","Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"nodes"},"PolicyDocument":{"Builder":{"Cluster":{"metadata":{"name":"existing-iam.example.com","creationTimestamp":"2017-01-01T00:00:00Z"},"spec":{"channel":"stable","configBase":"memfs://tests/existing-iam.example.com","cloudProvider":"aws","containerRuntime":"containerd","kubernetesVersion":"1.21.0","subnets":[{"name":"us-test-1a","cidr":"172.20.32.0/19","zone":"us-test-1a","type":"Public"},{"name":"us-test-1b","cidr":"172.20.64.0/19","zone":"us-test-1b","type":"Public"},{"name":"us-test-1c","cidr":"172.20.96.0/19","zone":"us-test-1c","type":"Public"}],"masterPublicName":"api.existing-iam.example.com","masterInternalName":"api.internal.existing-iam.example.com","networkCIDR":"172.20.0.0/16","topology":{"masters":"public","nodes":"public","dns":{"type":"Public"}},"secretStore":"memfs://tests/existing-iam.example.com/secrets","keyStore":"memfs://tests/existing-iam.example.com/pki","configStore":"memfs://tests/existing-iam.example.com","dnsZone":"Z1AFAKE1ZON3YO","clusterDNSDomain":"cluster.local","serviceClusterIPRange":"100.64.0.0/13","nonMasqueradeCIDR":"100.64.0.0/10","sshAccess":["0.0.0.0/0"],"kubernetesApiAccess":["0.0.0.0/0"],"etcdClusters":[{"name":"main","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-test-1a"},{"name":"b","instanceGroup":"master-us-test-1b"},{"name":"c","instanceGroup":"master-us-test-1c"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://tests/existing-iam.example.com/backups/etcd/main"}},{"name":"events","provider":"Manager","etcdMembers":[{"name":"a","instanceGroup":"master-us-test-1a"},{"name":"b","instanceGroup":"master-us-test-1b"},{"name":"c","instanceGroup":"master-us-test-1c"}],"enableEtcdTLS":true,"enableTLSAuth":true,"version":"3.4.13","backups":{"backupStore":"memfs://tests/existing-iam.example.com/backups/etcd/events"}}],"containerd":{"configOverride":"version = 2\n\n[plugins]\n\n [plugins.\"io.containerd.grpc.v1.cri\"]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\n runtime_type = \"io.containerd.runc.v2\"\n\n [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n","logLevel":"info","version":"1.4.9"},"docker":{"skipInstall":true},"kubeDNS":{"cacheMaxSize":1000,"cacheMaxConcurrent":150,"domain":"cluster.local","replicas":2,"provider":"CoreDNS","serverIP":"100.64.0.10","memoryRequest":"70Mi","cpuRequest":"100m","memoryLimit":"170Mi","nodeLocalDNS":{"enabled":false,"memoryRequest":"5Mi","cpuRequest":"25m"}},"kubeAPIServer":{"image":"k8s.gcr.io/kube-apiserver:v1.21.0","logLevel":2,"cloudProvider":"aws","securePort":443,"bindAddress":"0.0.0.0","enableAdmissionPlugins":["NamespaceLifecycle","LimitRanger","ServiceAccount","PersistentVolumeLabel","DefaultStorageClass","DefaultTolerationSeconds","MutatingAdmissionWebhook","ValidatingAdmissionWebhook","NodeRestriction","ResourceQuota"],"serviceClusterIPRange":"100.64.0.0/13","etcdServers":["https://127.0.0.1:4001"],"etcdServersOverrides":["/events#https://127.0.0.1:4002"],"allowPrivileged":true,"apiServerCount":3,"anonymousAuth":false,"kubeletPreferredAddressTypes":["InternalIP","Hostname","ExternalIP"],"storageBackend":"etcd3","authorizationMode":"AlwaysAllow","requestheaderUsernameHeaders":["X-Remote-User"],"requestheaderGroupHeaders":["X-Remote-Group"],"requestheaderExtraHeaderPrefixes":["X-Remote-Extra-"],"requestheaderAllowedNames":["aggregator"],"serviceAccountIssuer":"https://api.internal.existing-iam.example.com","serviceAccountJWKSURI":"https://api.internal.existing-iam.example.com/openid/v1/jwks","apiAudiences":["kubernetes.svc.default"]},"kubeControllerManager":{"logLevel":2,"image":"k8s.gcr.io/kube-controller-manager:v1.21.0","cloudProvider":"aws","clusterName":"existing-iam.example.com","clusterCIDR":"100.96.0.0/11","allocateNodeCIDRs":true,"configureCloudRoutes":false,"leaderElection":{"leaderElect":true},"attachDetachReconcileSyncPeriod":"1m0s","useServiceAccountCredentials":true},"kubeScheduler":{"logLevel":2,"image":"k8s.gcr.io/kube-scheduler:v1.21.0","leaderElection":{"leaderElect":true}},"kubeProxy":{"image":"k8s.gcr.io/kube-proxy:v1.21.0","cpuRequest":"100m","logLevel":2,"clusterCIDR":"100.96.0.0/11","hostnameOverride":"@aws"},"kubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"masterKubelet":{"anonymousAuth":false,"kubeconfigPath":"/var/lib/kubelet/kubeconfig","logLevel":2,"podManifestPath":"/etc/kubernetes/manifests","hostnameOverride":"@aws","enableDebuggingHandlers":true,"clusterDomain":"cluster.local","clusterDNS":"100.64.0.10","networkPluginName":"cni","cloudProvider":"aws","cgroupRoot":"/","registerSchedulable":false,"nonMasqueradeCIDR":"100.64.0.0/10","evictionHard":"memory.available\u003c100Mi,nodefs.available\u003c10%,nodefs.inodesFree\u003c5%,imagefs.available\u003c10%,imagefs.inodesFree\u003c5%","cgroupDriver":"systemd"},"cloudConfig":{"manageStorageClasses":true,"awsEBSCSIDriver":{"enabled":false}},"networking":{"cni":{}},"api":{"dns":{}},"authorization":{"alwaysAllow":{}},"iam":{"legacy":false}}},"HostedZoneID":"","KMSKeys":null,"Region":"us-test-1","ResourceARN":null,"Role":{},"UseServiceAccountIAM":false},"DNSZone":{"Name":"Z1AFAKE1ZON3YO","Lifecycle":null,"DNSName":null,"ZoneID":null,"Private":null,"PrivateVPC":null}},"ExternalPolicies":null,"Managed":false}, lifecycle ExistsAndWarnIfChanges W0320 08:33:08.158043 32017 task.go:121] overriding task *awstasks.IAMInstanceProfileRole {"Name":"kops-custom-node-role","Lifecycle":"Sync","InstanceProfile":{"Name":"kops-custom-node-role","Lifecycle":"Sync","Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ID":null,"Shared":true},"Role":{"ID":null,"Lifecycle":"ExistsAndWarnIfChanges","Name":"kops-custom-node-role","RolePolicyDocument":"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}","PermissionsBoundary":null,"Tags":{"KubernetesCluster":"existing-iam.example.com","Name":"kops-custom-node-role","kubernetes.io/cluster/existing-iam.example.com":"owned"},"ExportWithID":"nodes"}}, lifecycle ExistsAndWarnIfChanges I0320 08:33:08.171430 32017 executor.go:111] Tasks: 0 done / 91 total; 49 can run W0320 08:33:08.171920 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:08.172044 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:08.172109 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:08.172117 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:08.172148 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:08.172284 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.existing-iam.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:08.172436 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:33:08.172512 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:08.172593 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:08.172321 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:08.172762 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:08.172929 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:08.172968 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:08.172836 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:08.172674 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:08.172709 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:08.172534 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:08.173366 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:08.203605 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:33:08.203639 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. I0320 08:33:08.203672 32017 executor.go:111] Tasks: 49 done / 91 total; 18 can run W0320 08:33:08.204032 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/existing-iam.example.com" for IAM policy builder W0320 08:33:08.204111 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/existing-iam.example.com/backups/etcd/main" W0320 08:33:08.204147 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://tests/existing-iam.example.com/backups/etcd/events" W0320 08:33:08.204042 32017 iam_builder.go:513] ignoring memfs path "memfs://tests/existing-iam.example.com" for IAM policy builder W0320 08:33:08.204975 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:33:08.204998 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:33:08.205010 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. W0320 08:33:08.205022 32017 executor.go:128] Lifecycle set to ExistsAndWarnIfChanges and object was not found. I0320 08:33:08.205056 32017 executor.go:111] Tasks: 67 done / 91 total; 20 can run I0320 08:33:08.205254 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.205532 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.205769 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.205985 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.207508 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.209286 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.209619 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.209688 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:08.209800 32017 executor.go:111] Tasks: 87 done / 91 total; 4 can run I0320 08:33:08.210180 32017 executor.go:111] Tasks: 91 done / 91 total; 0 can run I0320 08:33:08.273385 32017 target.go:107] Terraform output is in /tmp/test1151957792/out --- PASS: TestExistingIAM (0.31s) === RUN TestPhaseNetwork I0320 08:33:08.275526 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:08.275608 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:08.275654 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:08.275705 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:08.275745 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:08.275772 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:08.275802 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:08.275834 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:08.275862 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:08.287336 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.289491 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.289654 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.289714 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.364098 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.473668 32017 executor.go:111] Tasks: 0 done / 107 total; 46 can run I0320 08:33:08.473986 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.lifecyclephases.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:08.474164 32017 executor.go:111] Tasks: 46 done / 107 total; 27 can run I0320 08:33:08.475003 32017 executor.go:111] Tasks: 73 done / 107 total; 28 can run I0320 08:33:08.475394 32017 executor.go:111] Tasks: 101 done / 107 total; 5 can run I0320 08:33:08.475658 32017 executor.go:111] Tasks: 106 done / 107 total; 1 can run I0320 08:33:08.475864 32017 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0320 08:33:08.487835 32017 target.go:107] Terraform output is in /tmp/test1115551137/out --- PASS: TestPhaseNetwork (0.21s) === RUN TestExternalLoadBalancer I0320 08:33:08.488857 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:08.488915 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:08.488962 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:08.489016 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:08.489055 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:08.489083 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:08.489111 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:08.489143 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:08.489171 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:08.499770 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.502332 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.502435 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.575090 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.683487 32017 executor.go:111] Tasks: 0 done / 86 total; 50 can run W0320 08:33:08.683949 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:08.684050 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:08.684150 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:08.684188 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:08.684273 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:08.684154 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:08.684294 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:08.684332 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:08.684338 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:08.684426 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:08.684411 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:08.684058 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:08.684637 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:08.684841 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:08.684910 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:08.684932 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:08.714522 32017 executor.go:111] Tasks: 50 done / 86 total; 18 can run W0320 08:33:08.715034 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.715082 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.715131 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:08.715159 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" W0320 08:33:08.715239 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.715451 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.715979 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.716025 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:08.716103 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" W0320 08:33:08.716733 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.716775 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:08.716794 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" I0320 08:33:08.717486 32017 executor.go:111] Tasks: 68 done / 86 total; 16 can run I0320 08:33:08.717827 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.718043 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.723993 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.725819 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.725942 32017 executor.go:111] Tasks: 84 done / 86 total; 2 can run I0320 08:33:08.726332 32017 executor.go:111] Tasks: 86 done / 86 total; 0 can run I0320 08:33:08.764765 32017 target.go:107] Terraform output is in /tmp/test2339117073/out I0320 08:33:08.766764 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:08.766822 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:08.766871 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:08.766922 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:08.766963 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:08.766990 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:08.767019 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:08.767050 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:08.767076 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:08.776871 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.778982 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.779081 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.851010 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:08.957604 32017 executor.go:111] Tasks: 0 done / 86 total; 50 can run I0320 08:33:08.957950 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:08.957978 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:08.958012 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:08.957994 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:08.958112 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:08.958153 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:08.959071 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:08.960727 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:08.960926 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:08.960970 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:08.961092 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:08.961124 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:08.961272 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:08.961450 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:08.961550 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:08.961487 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:08.961949 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:08.962020 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0320 08:33:08.962337 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:08.997060 32017 executor.go:111] Tasks: 50 done / 86 total; 18 can run W0320 08:33:08.997405 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.997601 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.997649 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.997701 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:08.997731 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" W0320 08:33:08.998499 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:08.998541 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:08.998560 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" I0320 08:33:08.999421 32017 executor.go:111] Tasks: 68 done / 86 total; 16 can run I0320 08:33:08.999607 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:08.999901 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.001927 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.003731 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.003867 32017 executor.go:111] Tasks: 84 done / 86 total; 2 can run I0320 08:33:09.004128 32017 executor.go:111] Tasks: 86 done / 86 total; 0 can run I0320 08:33:09.007168 32017 target.go:169] Cloudformation output is in /tmp/test149337834/out --- PASS: TestExternalLoadBalancer (0.53s) === RUN TestPhaseIAM integration_test.go:367: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:374: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0320 08:33:09.018162 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:09.018217 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:09.018259 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:09.018308 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:09.018359 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:09.018390 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:09.018422 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:09.018457 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:09.018485 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:09.032926 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.035240 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035329 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035384 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035457 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035513 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035558 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.035601 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.110936 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.228340 32017 executor.go:111] Tasks: 0 done / 95 total; 49 can run W0320 08:33:09.228556 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:09.228615 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:09.228672 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:09.228698 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:09.228712 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:09.228866 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:09.228923 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:09.228940 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:09.229056 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:09.229108 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:09.229108 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:09.229195 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:09.229247 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:09.229364 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:09.229284 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:09.229441 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:09.229458 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:09.229377 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:09.260859 32017 executor.go:111] Tasks: 49 done / 95 total; 22 can run W0320 08:33:09.261334 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.261441 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.261499 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.261526 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:09.261526 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.261686 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.262338 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.262381 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.262400 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:09.262996 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.263032 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.263051 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" I0320 08:33:09.263650 32017 executor.go:111] Tasks: 71 done / 95 total; 20 can run I0320 08:33:09.263958 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.264257 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.264522 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.264777 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.267151 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.268927 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.273837 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.274255 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.274387 32017 executor.go:111] Tasks: 91 done / 95 total; 4 can run I0320 08:33:09.274944 32017 executor.go:111] Tasks: 95 done / 95 total; 0 can run I0320 08:33:09.340195 32017 target.go:107] Terraform output is in /tmp/test3457368498/out I0320 08:33:09.342509 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:09.342571 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:09.342622 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:09.342675 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:09.342718 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:09.342745 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:09.342775 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:09.342809 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:09.342836 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:09.357535 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.359857 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.359952 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.360012 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.360068 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.360117 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.360162 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.360204 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.433586 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.546740 32017 executor.go:111] Tasks: 0 done / 95 total; 49 can run W0320 08:33:09.547207 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:09.547230 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:09.547457 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" W0320 08:33:09.547527 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:09.547529 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:09.547574 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:09.547632 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:09.547704 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:09.547717 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:09.547747 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:09.547788 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:09.547873 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:09.547926 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:09.547918 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:09.548007 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:09.548069 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:09.547878 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:09.548090 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:09.547490 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:09.548222 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:09.548189 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "mixedinstances.example.com" },{ Key: "kubernetes.io/cluster/mixedinstances.example.com", Value: "owned" },{ Key: "Name", Value: "mixedinstances.example.com" }] }] } I0320 08:33:09.570206 32017 executor.go:111] Tasks: 49 done / 95 total; 22 can run W0320 08:33:09.570693 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.570896 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.570963 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.571058 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.571099 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:09.571820 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.571863 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.571883 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" I0320 08:33:09.572836 32017 executor.go:111] Tasks: 71 done / 95 total; 20 can run I0320 08:33:09.573228 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.573482 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.573726 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.573997 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.576285 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.577414 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.577700 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.577950 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.578135 32017 executor.go:111] Tasks: 91 done / 95 total; 4 can run I0320 08:33:09.578502 32017 executor.go:111] Tasks: 95 done / 95 total; 0 can run I0320 08:33:09.584513 32017 target.go:169] Cloudformation output is in /tmp/test3404514932/out --- PASS: TestMixedInstancesASG (0.59s) === RUN TestMixedInstancesSpotASG I0320 08:33:09.607305 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:09.607359 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:09.607404 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:09.607456 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:09.607495 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:09.607522 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:09.607551 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:09.607582 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:09.607609 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:09.621821 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.624158 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624247 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624305 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624360 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624409 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624450 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.624490 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.696719 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.811052 32017 executor.go:111] Tasks: 0 done / 95 total; 49 can run I0320 08:33:09.811334 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" W0320 08:33:09.811414 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:09.811363 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:09.811457 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:09.811475 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:09.811514 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:09.811541 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:09.811675 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:09.811756 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:09.811855 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target W0320 08:33:09.811878 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:09.811873 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:09.811931 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:09.812125 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:09.811759 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:09.812262 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:09.812301 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:09.812300 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:09.847381 32017 executor.go:111] Tasks: 49 done / 95 total; 22 can run W0320 08:33:09.847823 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.847961 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.848047 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.848088 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:09.848117 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.848333 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.848998 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.849043 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.849108 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:09.849793 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:09.849834 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:09.849853 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" I0320 08:33:09.850460 32017 executor.go:111] Tasks: 71 done / 95 total; 20 can run I0320 08:33:09.850717 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.850889 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.851087 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.851379 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.855024 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.857416 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.859756 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.860381 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.860511 32017 executor.go:111] Tasks: 91 done / 95 total; 4 can run I0320 08:33:09.860958 32017 executor.go:111] Tasks: 95 done / 95 total; 0 can run I0320 08:33:09.926263 32017 target.go:107] Terraform output is in /tmp/test718938595/out I0320 08:33:09.928551 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:09.928621 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:09.928673 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:09.928729 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:09.928791 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:09.928822 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:09.928851 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:09.928883 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:09.928911 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:09.945037 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:09.948868 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.948973 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.949063 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.949121 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.949170 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.949217 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:09.949261 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.022309 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.135063 32017 executor.go:111] Tasks: 0 done / 95 total; 49 can run I0320 08:33:10.135455 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:10.135495 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:33:10.135601 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.135617 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse W0320 08:33:10.135595 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.135709 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:10.135725 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.135754 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:10.135855 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:10.135870 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.135669 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:10.136023 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:10.136062 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:10.135717 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:10.136151 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.136055 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.136234 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:10.136285 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:10.136334 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:10.136342 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:10.136243 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.mixedinstances.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/mixedinstances.example.com", Value: "owned" },{ Key: "Name", Value: "mixedinstances.example.com" },{ Key: "KubernetesCluster", Value: "mixedinstances.example.com" }] }] } I0320 08:33:10.159705 32017 executor.go:111] Tasks: 49 done / 95 total; 22 can run W0320 08:33:10.160061 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:10.160135 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:10.160171 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" W0320 08:33:10.160214 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:10.160418 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:10.161062 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/mixedinstances.example.com" for IAM policy builder W0320 08:33:10.161108 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/main" W0320 08:33:10.161127 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/mixedinstances.example.com/backups/etcd/events" I0320 08:33:10.162085 32017 executor.go:111] Tasks: 71 done / 95 total; 20 can run I0320 08:33:10.162295 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.162595 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.162776 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.163042 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.165174 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.166474 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.166677 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.167322 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.167465 32017 executor.go:111] Tasks: 91 done / 95 total; 4 can run I0320 08:33:10.167891 32017 executor.go:111] Tasks: 95 done / 95 total; 0 can run I0320 08:33:10.175886 32017 target.go:169] Cloudformation output is in /tmp/test1312121928/out --- PASS: TestMixedInstancesSpotASG (0.59s) === RUN TestContainerd I0320 08:33:10.195067 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:10.195122 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:10.195169 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:10.195217 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:10.195298 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:10.195328 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:10.195359 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:10.195391 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:10.195416 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:10.204586 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.206711 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.206803 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.279143 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.387339 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:33:10.388472 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:10.388533 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:10.388675 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse W0320 08:33:10.388748 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.388832 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:10.388846 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.388948 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:10.389184 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.388867 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:10.388844 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:10.389505 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key W0320 08:33:10.389637 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.390240 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:10.390265 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:10.389538 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.390088 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:10.390189 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:10.390914 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "containerd.example.com" },{ Key: "KubernetesCluster", Value: "containerd.example.com" },{ Key: "kubernetes.io/cluster/containerd.example.com", Value: "owned" }] }] } I0320 08:33:10.389629 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:10.421995 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:33:10.422362 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.422476 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.422533 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/main" W0320 08:33:10.422560 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/events" W0320 08:33:10.422577 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.423341 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.423384 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/main" W0320 08:33:10.423403 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/events" I0320 08:33:10.424292 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:33:10.424474 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.424785 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.426690 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.428640 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.428785 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:33:10.429031 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:33:10.432162 32017 target.go:169] Cloudformation output is in /tmp/test3686362552/out --- PASS: TestContainerd (0.25s) === RUN TestContainerdCustom I0320 08:33:10.442919 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:10.442974 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:10.443016 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:10.443073 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:10.443151 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:10.443179 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:10.443207 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:10.443238 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:10.443265 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:10.456983 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.459292 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.459398 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.532709 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.641803 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:33:10.642229 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:10.642459 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:10.642563 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:10.642644 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:10.642685 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:10.642742 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:10.642867 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.642963 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:10.643031 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:10.643048 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.642930 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.643074 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:10.643013 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:10.643028 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:10.643091 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:10.643177 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:10.643118 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:10.643213 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.644293 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.containerd.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "containerd.example.com" },{ Key: "KubernetesCluster", Value: "containerd.example.com" },{ Key: "kubernetes.io/cluster/containerd.example.com", Value: "owned" }] }] } I0320 08:33:10.668578 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:33:10.668876 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.669061 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.669208 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.669279 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/main" W0320 08:33:10.669309 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/events" W0320 08:33:10.670083 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/containerd.example.com" for IAM policy builder W0320 08:33:10.670123 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/main" W0320 08:33:10.670143 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/containerd.example.com/backups/etcd/events" I0320 08:33:10.671046 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:33:10.671226 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.671474 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.673864 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.675741 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.675872 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:33:10.676130 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:33:10.679507 32017 target.go:169] Cloudformation output is in /tmp/test2673946461/out --- PASS: TestContainerdCustom (0.25s) === RUN TestDockerCustom I0320 08:33:10.694555 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:10.694612 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:10.694661 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:10.694714 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:10.694801 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:10.694828 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:10.694858 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:10.694892 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:10.694920 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:10.704825 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.706960 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.707057 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.780113 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.887725 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:33:10.888146 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:10.888479 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:10.888514 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:10.888594 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.888601 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:10.888534 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:10.888645 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.docker.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.888693 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse W0320 08:33:10.888705 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:10.888499 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:10.888678 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:10.888799 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key W0320 08:33:10.888826 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.888863 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:10.888818 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.docker.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:10.888831 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" W0320 08:33:10.888958 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:10.888925 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.docker.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "docker.example.com" },{ Key: "KubernetesCluster", Value: "docker.example.com" },{ Key: "kubernetes.io/cluster/docker.example.com", Value: "owned" }] }] } I0320 08:33:10.888993 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:10.930221 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run W0320 08:33:10.930491 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/docker.example.com" for IAM policy builder W0320 08:33:10.930708 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/docker.example.com" for IAM policy builder W0320 08:33:10.930950 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/docker.example.com" for IAM policy builder W0320 08:33:10.931009 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/docker.example.com/backups/etcd/main" W0320 08:33:10.931030 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/docker.example.com/backups/etcd/events" W0320 08:33:10.931870 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/docker.example.com" for IAM policy builder W0320 08:33:10.931910 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/docker.example.com/backups/etcd/main" W0320 08:33:10.931929 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/docker.example.com/backups/etcd/events" I0320 08:33:10.932813 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:33:10.933247 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.933467 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.935783 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.937787 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:10.937958 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:33:10.938252 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:33:10.943937 32017 target.go:169] Cloudformation output is in /tmp/test2173564057/out --- PASS: TestDockerCustom (0.26s) === RUN TestAPIServerNodes I0320 08:33:10.953907 32017 featureflag.go:165] FeatureFlag "APIServerNodes"=true I0320 08:33:10.954134 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:10.954186 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:10.954228 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:10.954275 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:10.954348 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:10.954375 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:10.954400 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:10.954429 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:10.954455 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:10.965234 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:10.967142 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.967229 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:10.967286 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.040239 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:11.150856 32017 executor.go:111] Tasks: 0 done / 89 total; 46 can run W0320 08:33:11.151321 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:11.151370 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:11.151496 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:11.151585 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:11.151696 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:11.151800 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:11.151897 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:11.151943 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:11.152834 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:11.151959 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:11.153047 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:11.153076 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:11.153251 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:11.153286 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:11.153498 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:11.153479 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0320 08:33:11.152012 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:11.153714 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:11.153846 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:11.154050 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:11.183378 32017 executor.go:111] Tasks: 46 done / 89 total; 23 can run W0320 08:33:11.183732 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.183850 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.184527 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.184634 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:11.184664 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:11.185215 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.185842 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.186415 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:11.186520 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:11.186565 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:11.189541 32017 executor.go:111] Tasks: 69 done / 89 total; 17 can run I0320 08:33:11.189762 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.190000 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.190155 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.192329 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.193174 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.193578 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.193707 32017 executor.go:111] Tasks: 86 done / 89 total; 3 can run I0320 08:33:11.194040 32017 executor.go:111] Tasks: 89 done / 89 total; 0 can run I0320 08:33:11.198373 32017 target.go:169] Cloudformation output is in /tmp/test1140701766/out I0320 08:33:11.211664 32017 featureflag.go:165] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (0.26s) === RUN TestNTHQueueProcessor I0320 08:33:11.211965 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:11.212017 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:11.212058 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:11.212137 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:11.212182 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:11.212210 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:11.212239 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:11.212272 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:11.212299 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:11.221315 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.20.6 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.20.6 ********************************************************************************* I0320 08:33:11.223232 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.223306 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.734466 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:11.864747 32017 executor.go:111] Tasks: 0 done / 89 total; 48 can run W0320 08:33:11.865105 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:11.865205 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:11.865296 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:11.865574 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:11.865607 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:11.865649 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:11.865775 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:11.865802 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:11.865834 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:11.865218 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:11.865879 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:11.865910 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:11.865937 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:11.865886 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:11.865895 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:11.866135 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse I0320 08:33:11.895892 32017 executor.go:111] Tasks: 48 done / 89 total; 21 can run W0320 08:33:11.896268 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.896475 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.896483 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.896532 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:11.896557 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" W0320 08:33:11.896633 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.897277 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.897318 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:11.897383 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" W0320 08:33:11.898003 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:11.898041 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:11.898059 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" I0320 08:33:11.898688 32017 executor.go:111] Tasks: 69 done / 89 total; 16 can run I0320 08:33:11.899181 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.899428 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.901700 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.903044 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.903155 32017 executor.go:111] Tasks: 85 done / 89 total; 2 can run I0320 08:33:11.903513 32017 executor.go:111] Tasks: 87 done / 89 total; 2 can run I0320 08:33:11.903946 32017 executor.go:111] Tasks: 89 done / 89 total; 0 can run I0320 08:33:11.954891 32017 target.go:107] Terraform output is in /tmp/test4148059282/out I0320 08:33:11.957640 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:11.957701 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:11.957750 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:11.957809 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:11.957850 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:11.957877 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:11.957906 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:11.957938 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:11.957966 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:11.967440 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.20.6 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.20.6 ********************************************************************************* I0320 08:33:11.969603 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:11.969691 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.044659 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.170966 32017 executor.go:111] Tasks: 0 done / 89 total; 48 can run I0320 08:33:12.171499 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:12.171532 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:12.171665 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:12.171706 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:12.171704 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target W0320 08:33:12.171773 32017 warmpool.go:132] ASG warm pool is not supported by the cloudformation target I0320 08:33:12.171932 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:12.171965 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:12.171950 32017 dnszone.go:317] Check for existing route53 zone to re-use with name "" I0320 08:33:12.171969 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:12.172046 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.172173 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" W0320 08:33:12.172255 32017 sshkey.go:235] Cloudformation does not manage SSH keys; pre-creating SSH key I0320 08:33:12.172280 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:12.172369 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:12.172288 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.172076 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:12.172532 32017 dnszone.go:324] Existing zone "example.com." found; will configure cloudformation to reuse I0320 08:33:12.172463 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] }] } I0320 08:33:12.190868 32017 executor.go:111] Tasks: 48 done / 89 total; 21 can run W0320 08:33:12.191571 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:12.192047 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:12.192130 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:12.192382 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:12.192529 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" W0320 08:33:12.194883 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:12.194938 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:12.194960 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" I0320 08:33:12.195870 32017 executor.go:111] Tasks: 69 done / 89 total; 16 can run I0320 08:33:12.196264 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.196482 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.199123 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.200427 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.200561 32017 executor.go:111] Tasks: 85 done / 89 total; 2 can run I0320 08:33:12.200855 32017 executor.go:111] Tasks: 87 done / 89 total; 2 can run I0320 08:33:12.201057 32017 executor.go:111] Tasks: 89 done / 89 total; 0 can run I0320 08:33:12.205250 32017 target.go:169] Cloudformation output is in /tmp/test1260167806/out --- PASS: TestNTHQueueProcessor (1.00s) === RUN TestCustomIRSA I0320 08:33:12.216518 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:12.216594 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:12.216637 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:12.216688 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:12.216730 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:12.216757 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:12.216787 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:12.216820 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:12.216847 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:12.227701 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.20.6 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.20.6 ********************************************************************************* I0320 08:33:12.229984 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.230066 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.303010 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.417198 32017 executor.go:111] Tasks: 0 done / 87 total; 47 can run I0320 08:33:12.418423 32017 dnszone.go:243] Check for existing route53 zone to re-use with name "" I0320 08:33:12.418473 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:33:12.418582 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:12.418610 32017 dnszone.go:250] Existing zone "example.com." found; will configure TF to reuse W0320 08:33:12.418784 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:12.418817 32017 keypair.go:195] Issuing new certificate: "ca" W0320 08:33:12.419068 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:12.419305 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:12.419346 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:12.419566 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:12.419591 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:12.420048 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:12.420033 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0320 08:33:12.420477 32017 warmpool.go:125] ASG warm pool is not supported by the terraform target I0320 08:33:12.420678 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:12.421337 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:12.467607 32017 executor.go:111] Tasks: 47 done / 87 total; 22 can run W0320 08:33:12.468192 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.468277 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.468328 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.468354 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:12.468422 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.468588 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.469077 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.469120 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.469140 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" W0320 08:33:12.469774 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.469812 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.469830 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:12.470434 32017 executor.go:111] Tasks: 69 done / 87 total; 16 can run I0320 08:33:12.470626 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.470934 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.473239 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.475057 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.475177 32017 executor.go:111] Tasks: 85 done / 87 total; 2 can run I0320 08:33:12.475615 32017 executor.go:111] Tasks: 87 done / 87 total; 0 can run I0320 08:33:12.520248 32017 target.go:107] Terraform output is in /tmp/test4240660940/out --- PASS: TestCustomIRSA (0.31s) === RUN TestLifecycleMinimal I0320 08:33:12.522885 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:12.522976 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:12.523028 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:12.523085 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:12.523130 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:12.523158 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:12.523186 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:12.523219 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:12.523247 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:12.523311 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster minimal.example.com I0320 08:33:12.532767 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.534774 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.534870 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.608590 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.707817 32017 iamrole.go:90] ListRoles: { } I0320 08:33:12.714409 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:33:12.714721 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.714806 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] } I0320 08:33:12.714949 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:12.715032 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:12.714967 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:12.715116 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:12.715214 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } W0320 08:33:12.715371 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:12.715403 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:12.715276 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0320 08:33:12.715351 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:33:12.715545 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:12.715589 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:12.715609 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:12.715533 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0320 08:33:12.715454 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:12.715677 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:12.715613 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0320 08:33:12.715703 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:12.715792 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:12.715785 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.715868 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0320 08:33:12.715997 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.716011 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0320 08:33:12.716106 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.716206 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.716444 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:12.716522 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:12.716563 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:12.716633 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:12.716677 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0320 08:33:12.716865 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:12.717003 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:12.755749 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run I0320 08:33:12.755902 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.756123 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0320 08:33:12.756126 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0320 08:33:12.756252 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } W0320 08:33:12.756363 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder I0320 08:33:12.756378 32017 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com W0320 08:33:12.756407 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.756429 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:12.756378 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:12.756366 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0320 08:33:12.756488 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:12.756547 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } W0320 08:33:12.756580 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder I0320 08:33:12.756593 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0320 08:33:12.756628 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0320 08:33:12.756720 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:12.756772 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0320 08:33:12.756827 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } W0320 08:33:12.756901 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder I0320 08:33:12.756863 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0320 08:33:12.756920 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:12.757021 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0320 08:33:12.757116 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } W0320 08:33:12.757210 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.757249 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.757271 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:12.757333 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0320 08:33:12.757454 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:12.757528 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:12.757588 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] } I0320 08:33:12.757676 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0320 08:33:12.757723 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:12.757800 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:12.757848 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:12.757856 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0320 08:33:12.758206 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:33:12.758315 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.758400 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.758574 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:12.758788 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.758903 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.758964 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.759159 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:12.759347 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.759509 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:12.759572 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.759705 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:12.759764 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.759891 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:12.759944 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:12.760091 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:12.760145 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.760235 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.760307 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.760377 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.760449 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:12.760511 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.760582 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.760651 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:12.760718 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0320 08:33:12.760768 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:12.760809 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.760907 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.761029 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:12.761138 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:12.761201 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:12.761265 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:12.761334 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:12.761398 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:12.764544 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:33:12.764850 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:33:12.764909 32017 dns.go:157] Checking DNS records I0320 08:33:12.764928 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.764962 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:12.765023 32017 dns.go:219] Pre-creating DNS records I0320 08:33:12.765049 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:12.771233 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.775344 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.775477 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.849372 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.950385 32017 iamrole.go:90] ListRoles: { } I0320 08:33:12.951780 32017 executor.go:111] Tasks: 0 done / 79 total; 43 can run I0320 08:33:12.952078 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.952325 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.952692 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:12.952701 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.952868 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.952972 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:12.953010 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:12.953058 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:12.953109 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.953221 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:12.953864 32017 executor.go:111] Tasks: 43 done / 79 total; 18 can run I0320 08:33:12.954018 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.954228 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0320 08:33:12.954178 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:12.954291 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder I0320 08:33:12.954371 32017 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0320 08:33:12.954312 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0320 08:33:12.954450 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0320 08:33:12.954724 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:12.954799 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:12.954908 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } W0320 08:33:12.954982 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/minimal.example.com" for IAM policy builder W0320 08:33:12.955034 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/main" W0320 08:33:12.955056 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/minimal.example.com/backups/etcd/events" I0320 08:33:12.955070 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.955730 32017 executor.go:111] Tasks: 61 done / 79 total; 16 can run I0320 08:33:12.955841 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.955948 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.956063 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.956149 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.956239 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.956325 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.956411 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.956493 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.956578 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.956735 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.956885 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:12.957043 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:12.957166 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.957333 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.957439 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:12.957549 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.957650 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:12.957744 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:12.961609 32017 executor.go:111] Tasks: 77 done / 79 total; 2 can run I0320 08:33:12.961839 32017 executor.go:111] Tasks: 79 done / 79 total; 0 can run I0320 08:33:12.963548 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:12.963610 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:12.963643 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:12.963674 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:12.963713 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:12.963746 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:12.963777 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:12.963808 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:12.963841 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:12.963874 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:12.963908 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:12.963948 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:12.963977 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:12.964008 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:12.964040 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:12.964074 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:12.964105 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:12.964139 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:12.964174 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:12.964205 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:12.964234 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:12.964264 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:12.964298 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:12.964333 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:12.964365 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:12.965158 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:12.965185 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:12.965224 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965273 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0320 08:33:12.965328 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965386 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965453 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965511 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965553 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0320 08:33:12.965599 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965650 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0320 08:33:12.965688 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0320 08:33:12.965736 32017 api.go:53] PageSize not implemented I0320 08:33:12.965758 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:12.965790 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:12.965809 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:12.965835 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:12.965852 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:12.965903 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:12.965933 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:12.965980 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:12.966013 32017 iamrole.go:90] ListRoles: { } I0320 08:33:12.966069 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:12.966111 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:12.966149 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:nodes.minimal.example.com ok autoscaling-config:lt-2 ok I0320 08:33:12.966779 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0320 08:33:12.966809 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0320 08:33:12.966760 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:12.966906 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } route53-record:Z1AFAKE1ZON3YO/kops-controller.internal.minimal.example.com. ok iam-instance-profile:masters.minimal.example.com ok I0320 08:33:12.966928 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0320 08:33:12.966976 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } keypair:key-1 ok I0320 08:33:12.967056 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0320 08:33:12.967043 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0320 08:33:12.967083 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0320 08:33:12.967125 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0320 08:33:12.967149 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } autoscaling-config:lt-1 ok iam-role:nodes.minimal.example.com ok I0320 08:33:12.967173 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:12.967199 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0320 08:33:12.967312 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0320 08:33:12.967249 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:12.967402 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:12.967360 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0320 08:33:12.967438 32017 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0320 08:33:12.967461 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0320 08:33:12.967496 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0320 08:33:12.967431 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:12.967553 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0320 08:33:12.967607 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:12.967661 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0320 08:33:12.967833 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:12.967846 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:12.967931 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:12.968026 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:12.968115 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:12.968205 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:12.968510 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleMinimal (0.45s) === RUN TestLifecycleMinimalOpenstack lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0320 08:33:12.978111 32017 subnets.go:180] Assigned CIDR 192.168.32.0/19 to subnet us-test1 I0320 08:33:13.061887 32017 apply_cluster.go:483] Gossip DNS: skipping DNS validation I0320 08:33:13.219640 32017 executor.go:111] Tasks: 0 done / 92 total; 41 can run I0320 08:33:13.220062 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:13.220447 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:13.220593 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:13.220791 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:13.220825 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:13.221066 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:13.221146 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:13.222683 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:13.222748 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:13.221104 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:13.275527 32017 executor.go:111] Tasks: 41 done / 92 total; 45 can run I0320 08:33:13.276237 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:33:13.276280 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:33:13.346846 32017 executor.go:111] Tasks: 86 done / 92 total; 3 can run I0320 08:33:13.350115 32017 executor.go:111] Tasks: 89 done / 92 total; 3 can run W0320 08:33:13.353960 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.354103 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.354362 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. I0320 08:33:13.365374 32017 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0320 08:33:13.445255 32017 apply_cluster.go:483] Gossip DNS: skipping DNS validation I0320 08:33:13.596133 32017 executor.go:111] Tasks: 0 done / 92 total; 41 can run I0320 08:33:13.606181 32017 executor.go:111] Tasks: 41 done / 92 total; 45 can run I0320 08:33:13.617435 32017 executor.go:111] Tasks: 86 done / 92 total; 3 can run I0320 08:33:13.619051 32017 executor.go:111] Tasks: 89 done / 92 total; 3 can run W0320 08:33:13.622083 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.622329 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.623139 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.624389 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.625540 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:13.625567 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. I0320 08:33:13.628898 32017 executor.go:111] Tasks: 92 done / 92 total; 0 can run ServerGroup:9a7eb7cf-4a78-46a9-963d-35e95dca7110 ok Network:7982476c-db51-487e-92e5-70e45eb855f3 ok Port:5351073e-1d21-4597-8a1f-f656ce4ff394 ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Subnet:fc90de9e-f6dd-4387-966b-d0ec9abd4fc5 ok SecurityGroup:d7398d72-0ac8-4787-b6fd-85b6184d3869 ok Instance:086a01a7-e1ac-49cd-af5d-a35a799fbe0a ok SecurityGroup:d725c570-6a9e-470e-9532-05fea5e4cca1 ok ServerGroup:9301dc05-bf32-4335-853e-62bca51d3058 ok SecurityGroup:12abf53b-bc3b-4169-bc05-fa87a874a665 ok Port:7f06d588-2932-4b87-be16-2a93b477aac5 ok Instance:eb9ad313-517d-4c59-b9b3-d0a9009b2705 ok Port:07a99f51-76fc-4d5e-b32a-786bb5820cfe ok Instance:6aeb2487-4cd4-40ec-8486-23379d82c1f7 ok --- PASS: TestLifecycleMinimalOpenstack (1.77s) === RUN TestLifecycleMinimalGCE I0320 08:33:14.743370 32017 featureflag.go:165] FeatureFlag "AlphaAllowGCE"=true lifecycle_integration_test.go:505: running lifecycle test for cluster minimal-gce.example.com W0320 08:33:14.947536 32017 external_access.go:36] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0320 08:33:14.947592 32017 firewall.go:35] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0320 08:33:14.947608 32017 firewall.go:64] Adding overlay network for X -> node rule - HACK W0320 08:33:14.947647 32017 firewall.go:118] Adding overlay network for X -> master rule - HACK W0320 08:33:14.947714 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups W0320 08:33:14.947740 32017 autoscalinggroup.go:156] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:33:14.947756 32017 autoscalinggroup.go:157] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:33:14.947770 32017 autoscalinggroup.go:161] gsa: default I0320 08:33:14.947811 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:33:14.947826 32017 autoscalinggroup.go:161] gsa: default I0320 08:33:14.953122 32017 executor.go:111] Tasks: 0 done / 55 total; 35 can run W0320 08:33:14.955485 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:14.955572 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:14.955601 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:14.955621 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:14.955688 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:14.956040 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:14.956213 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:14.956435 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:14.956524 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:14.956672 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:14.983787 32017 executor.go:111] Tasks: 35 done / 55 total; 16 can run I0320 08:33:14.984281 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:33:14.986165 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:33:15.014356 32017 executor.go:111] Tasks: 51 done / 55 total; 2 can run I0320 08:33:15.022004 32017 executor.go:111] Tasks: 53 done / 55 total; 2 can run I0320 08:33:15.022305 32017 executor.go:111] Tasks: 55 done / 55 total; 0 can run I0320 08:33:15.022349 32017 dns.go:157] Checking DNS records I0320 08:33:15.022399 32017 dns.go:219] Pre-creating DNS records W0320 08:33:15.224112 32017 external_access.go:36] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0320 08:33:15.224175 32017 firewall.go:35] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0320 08:33:15.224198 32017 firewall.go:64] Adding overlay network for X -> node rule - HACK W0320 08:33:15.224249 32017 firewall.go:118] Adding overlay network for X -> master rule - HACK W0320 08:33:15.224315 32017 autoscalinggroup.go:117] enabling storage-rw for etcd backups W0320 08:33:15.224352 32017 autoscalinggroup.go:156] VMs will be configured to use the GCE default compute Service Account! This is an anti-pattern W0320 08:33:15.224375 32017 autoscalinggroup.go:157] Use a pre-created Service Account with the flag: --gce-service-account=account@projectname.iam.gserviceaccount.com I0320 08:33:15.224395 32017 autoscalinggroup.go:161] gsa: default I0320 08:33:15.224486 32017 autoscalinggroup.go:153] VMs using Service Account: default I0320 08:33:15.224510 32017 autoscalinggroup.go:161] gsa: default I0320 08:33:15.225883 32017 executor.go:111] Tasks: 0 done / 55 total; 35 can run I0320 08:33:15.228294 32017 executor.go:111] Tasks: 35 done / 55 total; 16 can run I0320 08:33:15.229708 32017 executor.go:111] Tasks: 51 done / 55 total; 2 can run I0320 08:33:15.237194 32017 executor.go:111] Tasks: 53 done / 55 total; 2 can run I0320 08:33:15.237384 32017 executor.go:111] Tasks: 55 done / 55 total; 0 can run I0320 08:33:15.238319 32017 gce.go:86] Scanning zones: [us-test1-a] FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:node-to-node-minimal-gce-example-com ok FirewallRule:cidr-to-node-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:cidr-to-master-minimal-gce-example-com ok Disk:d1-etcd-events-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok Disk:d1-etcd-main-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok InstanceTemplate:nodes-minimal-gce-example-com-1647765195 ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1647765195 ok --- PASS: TestLifecycleMinimalGCE (0.50s) === RUN TestLifecycleFloatingIPOpenstack lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0320 08:33:15.247571 32017 subnets.go:180] Assigned CIDR 192.168.32.0/19 to subnet us-test1 I0320 08:33:15.331641 32017 apply_cluster.go:483] Gossip DNS: skipping DNS validation I0320 08:33:15.488581 32017 executor.go:111] Tasks: 0 done / 94 total; 42 can run I0320 08:33:15.489070 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:15.489130 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:15.489327 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" W0320 08:33:15.489473 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:15.489621 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:15.489663 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:15.489709 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:15.489790 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:15.489848 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:15.489862 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:15.511534 32017 executor.go:111] Tasks: 42 done / 94 total; 45 can run I0320 08:33:15.512295 32017 keypair.go:195] Issuing new certificate: "kubelet" I0320 08:33:15.512673 32017 keypair.go:195] Issuing new certificate: "kube-proxy" I0320 08:33:15.539222 32017 executor.go:111] Tasks: 87 done / 94 total; 4 can run I0320 08:33:15.542012 32017 executor.go:111] Tasks: 91 done / 94 total; 3 can run W0320 08:33:15.544483 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.545170 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.545289 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. I0320 08:33:15.556229 32017 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0320 08:33:15.637339 32017 apply_cluster.go:483] Gossip DNS: skipping DNS validation I0320 08:33:15.792053 32017 executor.go:111] Tasks: 0 done / 94 total; 42 can run I0320 08:33:15.800816 32017 executor.go:111] Tasks: 42 done / 94 total; 45 can run I0320 08:33:15.807711 32017 executor.go:111] Tasks: 87 done / 94 total; 4 can run I0320 08:33:15.809350 32017 executor.go:111] Tasks: 91 done / 94 total; 3 can run W0320 08:33:15.817582 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.818287 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.818517 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.820853 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.821137 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. W0320 08:33:15.821689 32017 bootstrapscript.go:141] exporting username and password. Consider using application credentials instead. I0320 08:33:15.825666 32017 executor.go:111] Tasks: 94 done / 94 total; 0 can run Router-IF:b774e611-407a-418a-9656-d8ef5bbfc855 ok Instance:13920dbc-30fa-40fb-be6d-ed1db3027e72 ok ServerGroup:d030d958-2d07-4293-adda-8d8504251111 ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Port:7001f5ff-2220-4ac3-8795-655e0e0ace53 ok ServerGroup:db17c1b0-f297-4a2c-a988-1fac785b9b40 ok SecurityGroup:5af61247-920b-4bdc-b68e-8cf23c4c7eca ok Port:fdc29abf-e5e3-470d-a5a8-bba91d016a5d ok Port:1875d9d0-1dd0-4af8-90f4-a88422ef1cb5 ok Network:8510779b-91ae-4d4a-b2ff-a35ff011bd33 ok SecurityGroup:88d5ac05-b9c3-4333-a6fd-8e4a41b159a6 ok Subnet:b774e611-407a-418a-9656-d8ef5bbfc855 ok Router:c8933757-2686-46e3-9c17-bb3d986dcdb3 ok Port:d7a32b0b-5458-4bbf-bbfd-92b90843d639 ok Instance:9b78d8c2-121e-427a-82fe-bc09e9d1e2a9 ok Instance:ade652e3-bd4f-4102-8046-3df07457d8f3 ok SecurityGroup:dfa9242c-1672-4514-a9df-945755322d3c ok --- PASS: TestLifecycleFloatingIPOpenstack (1.70s) === RUN TestLifecyclePrivateCalico I0320 08:33:16.941892 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:16.941989 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:16.942065 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:16.942176 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:16.942237 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:16.942293 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:16.942348 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:16.942402 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:16.942452 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:16.942546 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster privatecalico.example.com I0320 08:33:16.954122 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:16.956400 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:16.956515 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:16.956616 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.028333 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.386998 32017 iamrole.go:90] ListRoles: { } I0320 08:33:17.393524 32017 executor.go:111] Tasks: 0 done / 110 total; 48 can run I0320 08:33:17.393768 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:17.393862 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:17.393784 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.393889 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:17.394004 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:17.393913 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.394110 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:17.394220 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:17.394231 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:17.394256 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.395961 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:17.395925 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:17.396078 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:17.396131 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.396244 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:17.396352 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0320 08:33:17.396486 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:17.396550 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:17.396695 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" }] }] } I0320 08:33:17.396872 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } W0320 08:33:17.396997 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:17.397137 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:17.397161 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:17.397290 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:17.397243 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.397484 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.397586 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" }] }] } I0320 08:33:17.397808 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:17.397905 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:17.397980 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:17.398056 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:17.397909 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.398196 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0320 08:33:17.398474 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.398839 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "bastions.privatecalico.example.com", Tags: [{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.424675 32017 executor.go:111] Tasks: 48 done / 110 total; 27 can run I0320 08:33:17.424874 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0320 08:33:17.424873 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.424993 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } W0320 08:33:17.425147 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder I0320 08:33:17.425079 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0320 08:33:17.425160 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0320 08:33:17.425162 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion-elb.privatecalico.example.com"] } ] } W0320 08:33:17.425351 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:33:17.425398 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder I0320 08:33:17.425350 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0320 08:33:17.425475 32017 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0320 08:33:17.425305 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } W0320 08:33:17.425490 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:33:17.425535 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" I0320 08:33:17.425512 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0320 08:33:17.425539 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:17.425620 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:17.425682 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:17.425777 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0320 08:33:17.425737 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0320 08:33:17.425836 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0320 08:33:17.425910 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0320 08:33:17.425912 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.426049 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0320 08:33:17.426138 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0320 08:33:17.426183 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:17.426342 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } W0320 08:33:17.427191 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:33:17.427317 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" W0320 08:33:17.427346 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" I0320 08:33:17.427343 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0320 08:33:17.427458 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:17.427551 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.427662 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0320 08:33:17.427791 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion ELB", GroupName: "bastion-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:17.427909 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.427926 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0320 08:33:17.428103 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatecalico.example.com" }] }], VpcId: "vpc-1" } I0320 08:33:17.428272 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:17.428477 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:17.428598 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:17.428361 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0320 08:33:17.428820 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:17.428906 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0320 08:33:17.428951 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:17.429121 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }], VpcId: "vpc-1" } I0320 08:33:17.429353 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:17.429491 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:17.429599 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:17.429719 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:17.429838 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:17.429825 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0320 08:33:17.429922 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:17.430096 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0320 08:33:17.430267 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:17.430329 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:17.431567 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:17.431673 32017 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] } I0320 08:33:17.431832 32017 executor.go:111] Tasks: 75 done / 110 total; 29 can run I0320 08:33:17.432004 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.432189 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } W0320 08:33:17.432274 32017 api.go:53] PageSize not implemented I0320 08:33:17.432317 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } W0320 08:33:17.432430 32017 api.go:53] PageSize not implemented I0320 08:33:17.432426 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.432514 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0320 08:33:17.432648 32017 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.432628 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:17.432722 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0320 08:33:17.432762 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0320 08:33:17.432820 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0320 08:33:17.432831 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:17.432904 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.432938 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.433017 32017 tags.go:74] AddTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm"], Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0320 08:33:17.433070 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.433100 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "TCP:22", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "bastion-privatecalico-exa-hocohm" } I0320 08:33:17.433143 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "bastion-privatecalico-exa-hocohm" } I0320 08:33:17.433157 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:17.433252 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:17.433362 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.433435 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:17.433515 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.433657 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.433784 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:17.433896 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:17.433999 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.434111 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.434205 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.434292 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:17.434389 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:17.434460 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.434557 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.434645 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.434746 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.434838 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:17.434864 32017 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" }] }] } I0320 08:33:17.434936 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:17.435038 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.435111 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.435205 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:17.435249 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.435360 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0320 08:33:17.435473 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:17.435557 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:17.435625 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.435676 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.435792 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.435884 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:17.435963 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:17.436041 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:17.436117 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:17.436188 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:17.436260 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:17.436334 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0320 08:33:17.436402 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.436501 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:17.436583 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.436660 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.436754 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0320 08:33:17.436808 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.436864 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:17.436904 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:17.436964 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.437011 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.437050 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0320 08:33:17.437089 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.441560 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:33:17.441702 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:17.441760 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.441898 32017 tags.go:163] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:17.441880 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:17.442065 32017 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0320 08:33:17.442190 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0320 08:33:17.442239 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:17.442282 32017 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0320 08:33:17.442359 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:33:17.442430 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.442561 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0320 08:33:17.442629 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:17.442696 32017 dns.go:157] Checking DNS records I0320 08:33:17.442717 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.442749 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:17.442799 32017 dns.go:219] Pre-creating DNS records I0320 08:33:17.442821 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:17.447721 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.449886 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.449978 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.450040 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.523093 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.886373 32017 iamrole.go:90] ListRoles: { } I0320 08:33:17.888361 32017 executor.go:111] Tasks: 0 done / 110 total; 48 can run I0320 08:33:17.888901 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.889075 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:17.889135 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:17.889165 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:17.889211 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.889495 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:17.889576 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.889767 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:17.889873 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:17.890024 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.890678 32017 executor.go:111] Tasks: 48 done / 110 total; 27 can run I0320 08:33:17.890818 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.890939 32017 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0320 08:33:17.891065 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0320 08:33:17.891017 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.891180 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com W0320 08:33:17.891171 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder I0320 08:33:17.891143 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0320 08:33:17.891452 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:17.891519 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0320 08:33:17.891780 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } W0320 08:33:17.891880 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatecalico.example.com" for IAM policy builder W0320 08:33:17.891952 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/main" I0320 08:33:17.891866 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } W0320 08:33:17.891990 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatecalico.example.com/backups/etcd/events" I0320 08:33:17.892116 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:17.892222 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0320 08:33:17.892487 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:17.892554 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:17.892680 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.892849 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion-elb.privatecalico.example.com"] } ] } I0320 08:33:17.893021 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.893151 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.893265 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:17.893407 32017 executor.go:111] Tasks: 75 done / 110 total; 29 can run I0320 08:33:17.893516 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } W0320 08:33:17.893669 32017 api.go:53] PageSize not implemented I0320 08:33:17.893636 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:17.893708 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k","bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.893799 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0320 08:33:17.893770 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.893841 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } W0320 08:33:17.893894 32017 api.go:53] PageSize not implemented I0320 08:33:17.893923 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.893931 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k","bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.894066 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.894111 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.894158 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "bastion-privatecalico-exa-hocohm" } I0320 08:33:17.894198 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.894342 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.894441 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.894543 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.894698 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.894748 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:17.894823 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.894896 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.894967 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:17.895038 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.895112 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.895182 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.895246 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:17.895320 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.895389 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.895488 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:17.895561 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:17.895630 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.895700 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.895771 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:17.895839 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:17.895907 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:17.895976 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:17.896054 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.896221 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:17.896375 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0320 08:33:17.896476 32017 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0320 08:33:17.896548 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0320 08:33:17.899858 32017 executor.go:111] Tasks: 104 done / 110 total; 5 can run I0320 08:33:17.899996 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0320 08:33:17.900110 32017 api.go:53] PageSize not implemented I0320 08:33:17.900126 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0320 08:33:17.899996 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:17.900231 32017 dnsname.go:122] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0320 08:33:17.900152 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm","api-privatecalico-example-0uch4k"] } W0320 08:33:17.900390 32017 api.go:53] PageSize not implemented I0320 08:33:17.900430 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatecalico-exa-hocohm","api-privatecalico-example-0uch4k"] } I0320 08:33:17.900528 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0320 08:33:17.900658 32017 executor.go:111] Tasks: 109 done / 110 total; 1 can run I0320 08:33:17.900732 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:17.900847 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:17.903020 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:17.903082 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:17.903119 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:17.903150 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:17.903187 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0320 08:33:17.903225 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:17.903255 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:17.903288 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:17.903324 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:17.903358 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:17.903394 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:17.903431 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:17.903468 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0320 08:33:17.903511 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0320 08:33:17.903549 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:17.903582 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:17.903616 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:17.903654 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:17.903687 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:17.903733 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:17.903769 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:17.903804 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:17.903838 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:17.903875 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:17.903910 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:17.903946 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:17.903979 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:17.904016 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:17.904051 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:17.904085 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:17.904122 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:17.904160 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:17.904195 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:17.905051 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:17.905080 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:17.905119 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905181 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0320 08:33:17.905257 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905316 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905366 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905443 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905505 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0320 08:33:17.905567 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905620 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:17.905649 32017 natgateway.go:115] DescribeNatGateways: { } I0320 08:33:17.905686 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0320 08:33:17.905729 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0320 08:33:17.905778 32017 api.go:53] PageSize not implemented I0320 08:33:17.905796 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k","bastion-privatecalico-exa-hocohm"] } I0320 08:33:17.905849 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:17.905878 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:17.905897 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:17.905923 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:17.905940 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:17.905993 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.906021 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:17.906065 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:17.906101 32017 iamrole.go:90] ListRoles: { } I0320 08:33:17.906148 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:17.906197 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:17.906239 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0320 08:33:17.906278 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0320 08:33:17.906312 32017 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-config:lt-3 ok I0320 08:33:17.906976 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } autoscaling-config:lt-2 ok I0320 08:33:17.907087 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok iam-instance-profile:nodes.privatecalico.example.com ok I0320 08:33:17.906997 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "bastion-privatecalico-exa-hocohm" } load-balancer:bastion-privatecalico-exa-hocohm ok I0320 08:33:17.907087 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:17.907150 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0320 08:33:17.907243 32017 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0320 08:33:17.907167 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0320 08:33:17.907190 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } load-balancer:api-privatecalico-example-0uch4k ok W0320 08:33:17.907317 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions autoscaling-group:bastion.privatecalico.example.com ok I0320 08:33:17.907337 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:17.907270 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0320 08:33:17.907389 32017 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0320 08:33:17.907367 32017 natgateway.go:181] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0320 08:33:17.907208 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/api.privatecalico.example.com ok I0320 08:33:17.907446 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0320 08:33:17.907451 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:17.907501 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok autoscaling-group:nodes.privatecalico.example.com ok I0320 08:33:17.907542 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0320 08:33:17.907590 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0320 08:33:17.907620 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0320 08:33:17.907676 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0320 08:33:17.907516 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-5" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } I0320 08:33:17.907693 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } W0320 08:33:17.907709 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:17.907720 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0320 08:33:17.907727 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0320 08:33:17.907757 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0320 08:33:17.907819 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0320 08:33:17.907771 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0320 08:33:17.907864 32017 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0320 08:33:17.907849 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:17.907925 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:17.907876 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0320 08:33:17.907989 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0320 08:33:17.907981 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0320 08:33:17.908068 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:17.908083 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok autoscaling-config:lt-1 ok I0320 08:33:17.908135 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0320 08:33:17.908198 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0320 08:33:17.908312 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0320 08:33:17.908364 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:17.908429 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:17.908481 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0320 08:33:17.908575 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:17.908600 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-5" } security-group:sg-5 ok I0320 08:33:17.908637 32017 address.go:183] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0320 08:33:17.908705 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:17.908777 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:17.908854 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:17.908866 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:17.908943 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0320 08:33:17.908997 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:17.909069 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:17.909153 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:17.909466 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecyclePrivateCalico (0.97s) === RUN TestLifecyclePrivateKopeio I0320 08:33:17.910071 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:17.910140 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:17.910179 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:17.910228 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:17.910271 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:17.910300 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:17.910330 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:17.910364 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:17.910389 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:17.910439 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster privatekopeio.example.com I0320 08:33:17.922502 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:17.925977 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:17.926252 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:17.926398 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.000676 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.127394 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.136038 32017 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0320 08:33:18.136275 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:18.136418 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0320 08:33:18.136631 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.136699 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:18.136716 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.136674 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] } I0320 08:33:18.136933 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:18.136918 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0320 08:33:18.136841 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.137126 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:18.137120 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } W0320 08:33:18.137207 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:18.137224 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0320 08:33:18.137215 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } W0320 08:33:18.137330 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:18.137368 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:18.137200 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.137425 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:18.137399 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0320 08:33:18.137471 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:18.137639 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:18.137672 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:18.137563 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:18.137802 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:18.137889 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0320 08:33:18.138145 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.138415 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0320 08:33:18.138578 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.138735 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:18.138842 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:18.138901 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:18.139124 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:18.139208 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:18.139265 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:18.139322 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:18.165147 32017 executor.go:111] Tasks: 47 done / 114 total; 30 can run I0320 08:33:18.165310 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } W0320 08:33:18.165545 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder I0320 08:33:18.165502 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0320 08:33:18.165473 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion-elb.privatekopeio.example.com"] } ] } I0320 08:33:18.165652 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com W0320 08:33:18.165598 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" I0320 08:33:18.165666 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:18.165732 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" I0320 08:33:18.165783 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } W0320 08:33:18.165745 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder I0320 08:33:18.165931 32017 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0320 08:33:18.165903 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0320 08:33:18.166047 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com W0320 08:33:18.166144 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder I0320 08:33:18.166102 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:18.166151 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0320 08:33:18.166208 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:18.166255 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0320 08:33:18.166282 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:18.166318 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0320 08:33:18.166334 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.166465 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:18.166585 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0320 08:33:18.166553 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } W0320 08:33:18.166666 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder W0320 08:33:18.166820 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" W0320 08:33:18.166847 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" I0320 08:33:18.166824 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0320 08:33:18.166867 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.167081 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0320 08:33:18.167185 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.167328 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.167484 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0320 08:33:18.167461 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0320 08:33:18.167541 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-1" } I0320 08:33:18.167637 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:18.167407 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0320 08:33:18.167729 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.167826 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.167909 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.168018 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0320 08:33:18.168128 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion ELB", GroupName: "bastion-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:18.168109 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:18.168212 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0320 08:33:18.168268 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:18.168349 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:18.168423 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:18.168489 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:18.168560 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:18.168678 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:18.168741 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:18.168812 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0320 08:33:18.168962 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0320 08:33:18.168961 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0320 08:33:18.169049 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:18.169092 32017 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0320 08:33:18.169142 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0320 08:33:18.169173 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0320 08:33:18.169290 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:18.169357 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:18.169397 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:18.169442 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:18.169484 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:18.169525 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0320 08:33:18.169567 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0320 08:33:18.169662 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" } ] } I0320 08:33:18.169769 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:18.169814 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0320 08:33:18.169873 32017 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0320 08:33:18.169992 32017 executor.go:111] Tasks: 77 done / 114 total; 31 can run I0320 08:33:18.170108 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } W0320 08:33:18.170269 32017 api.go:53] PageSize not implemented I0320 08:33:18.170238 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:18.170332 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:18.170416 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.170462 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0320 08:33:18.170567 32017 api.go:53] PageSize not implemented I0320 08:33:18.170602 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:18.170596 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0320 08:33:18.170682 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.170825 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.170818 32017 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] } I0320 08:33:18.170916 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0320 08:33:18.170886 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0320 08:33:18.170965 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0320 08:33:18.171046 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0320 08:33:18.171102 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-4" } I0320 08:33:18.171017 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0320 08:33:18.171146 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:18.171200 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.171261 32017 tags.go:74] AddTags { LoadBalancerNames: ["bastion-privatekopeio-exa-d8ef8e"], Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.privatekopeio.example.com" }] } I0320 08:33:18.171295 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:18.171326 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.171364 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.171443 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:18.171389 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "TCP:22", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "bastion-privatekopeio-exa-d8ef8e" } I0320 08:33:18.171521 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "bastion-privatekopeio-exa-d8ef8e" } I0320 08:33:18.171516 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0320 08:33:18.171616 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.171692 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:18.171786 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.171892 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.171993 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.172051 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.172171 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.172265 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.172367 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.172455 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.172554 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.172652 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.172748 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.172833 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.172884 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.172980 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.173071 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.173167 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0320 08:33:18.173253 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0320 08:33:18.173297 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.173347 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:18.173417 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:18.173478 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:18.173546 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.173686 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.173761 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.173856 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:18.173932 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.174062 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:18.174149 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:18.174242 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.174329 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0320 08:33:18.174386 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.174443 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:18.174496 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.174578 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0320 08:33:18.174621 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.174669 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:18.174722 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.174765 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0320 08:33:18.174809 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0320 08:33:18.174842 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:18.174878 32017 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0320 08:33:18.174923 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:18.174959 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.175003 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.175056 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0320 08:33:18.175094 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.175255 32017 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0320 08:33:18.175342 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:18.175393 32017 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0320 08:33:18.175455 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:18.175499 32017 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0320 08:33:18.175548 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0320 08:33:18.175592 32017 tags.go:42] CreateTags { Resources: ["subnet-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0320 08:33:18.175628 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0320 08:33:18.175665 32017 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0320 08:33:18.179393 32017 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0320 08:33:18.179490 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:18.179582 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:18.179643 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-2" } I0320 08:33:18.179705 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0320 08:33:18.179784 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:18.179904 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-3" } I0320 08:33:18.180015 32017 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0320 08:33:18.180101 32017 dns.go:157] Checking DNS records I0320 08:33:18.180131 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.180186 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.180252 32017 dns.go:219] Pre-creating DNS records I0320 08:33:18.180280 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.185045 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.187308 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.187403 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.187467 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.260516 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.381409 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.383521 32017 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0320 08:33:18.383757 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.383839 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.383978 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.384090 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:18.384127 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:18.384182 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:18.384241 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.384303 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:18.384414 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.384674 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] }] } I0320 08:33:18.386469 32017 executor.go:111] Tasks: 47 done / 114 total; 30 can run I0320 08:33:18.386646 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.386875 32017 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0320 08:33:18.386827 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0320 08:33:18.387018 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0320 08:33:18.387094 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0320 08:33:18.387089 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:18.387207 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0320 08:33:18.387419 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:18.387509 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } W0320 08:33:18.387623 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder I0320 08:33:18.387630 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.387784 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.387929 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } W0320 08:33:18.388078 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/privatekopeio.example.com" for IAM policy builder I0320 08:33:18.388098 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } W0320 08:33:18.388180 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/main" I0320 08:33:18.388293 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } W0320 08:33:18.388339 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/privatekopeio.example.com/backups/etcd/events" I0320 08:33:18.388490 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0320 08:33:18.388796 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:18.388866 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion-elb.privatekopeio.example.com"] } ] } I0320 08:33:18.389062 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] }] } I0320 08:33:18.389240 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0320 08:33:18.389489 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:18.389951 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:18.390125 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:18.390413 32017 executor.go:111] Tasks: 77 done / 114 total; 31 can run W0320 08:33:18.391364 32017 api.go:53] PageSize not implemented I0320 08:33:18.391284 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.391398 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8","bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.391455 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:18.391535 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.391605 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "bastion-privatekopeio-exa-d8ef8e" } I0320 08:33:18.391585 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } W0320 08:33:18.391718 32017 api.go:53] PageSize not implemented I0320 08:33:18.391725 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.391756 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8","bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.391863 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0320 08:33:18.391917 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0320 08:33:18.391848 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.392077 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:18.392259 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.392366 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.392460 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.392550 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.392641 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:18.392741 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.392826 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.392912 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:18.393000 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.393082 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.393166 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.393251 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.393360 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.393434 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.393612 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.393715 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.393809 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.393902 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.393986 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.394071 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.394158 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:18.394243 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0320 08:33:18.394347 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:18.394452 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.394560 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0320 08:33:18.394684 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:18.397100 32017 executor.go:111] Tasks: 108 done / 114 total; 6 can run W0320 08:33:18.397288 32017 api.go:53] PageSize not implemented I0320 08:33:18.397313 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8","bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.397327 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0320 08:33:18.397354 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:18.397475 32017 dnsname.go:122] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0320 08:33:18.397451 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0320 08:33:18.397487 32017 api.go:53] PageSize not implemented I0320 08:33:18.397534 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8","bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.397648 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0320 08:33:18.397747 32017 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0320 08:33:18.400415 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:18.400513 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:18.400552 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:18.400585 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:18.400624 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:18.400659 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:18.400690 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:18.400725 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:18.400762 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:18.400803 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:18.400845 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:18.400885 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0320 08:33:18.400929 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:18.400964 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:18.401001 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:18.401038 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:18.401074 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:18.401112 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0320 08:33:18.401149 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:18.401185 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:18.401220 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:18.401255 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:18.401290 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:18.401325 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:18.401363 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:18.401395 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:18.401433 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0320 08:33:18.401470 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0320 08:33:18.401506 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:18.401541 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:18.401574 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:18.401610 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:18.401649 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:18.401686 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:18.402664 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:18.402695 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:18.402739 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.402811 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0320 08:33:18.402941 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403044 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403132 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403229 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403318 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0320 08:33:18.403442 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403574 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:18.403635 32017 natgateway.go:115] DescribeNatGateways: { } I0320 08:33:18.403702 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0320 08:33:18.403784 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0320 08:33:18.403845 32017 api.go:53] PageSize not implemented I0320 08:33:18.403864 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8","bastion-privatekopeio-exa-d8ef8e"] } I0320 08:33:18.403917 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:18.403946 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:18.403965 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:18.403988 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:18.404007 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:18.404054 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.404082 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.404132 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:18.404169 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.404219 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:18.404270 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:18.404333 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3","rtb-1","rtb-2"] } I0320 08:33:18.404382 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0320 08:33:18.404414 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0320 08:33:18.405091 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:18.405145 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0320 08:33:18.405232 32017 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0320 08:33:18.405160 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:18.405253 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } autoscaling-group:nodes.privatekopeio.example.com ok W0320 08:33:18.405279 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.405290 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } I0320 08:33:18.405302 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:18.405331 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:18.405358 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0320 08:33:18.405322 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0320 08:33:18.405482 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok I0320 08:33:18.405473 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "bastion-privatekopeio-exa-d8ef8e" } load-balancer:bastion-privatekopeio-exa-d8ef8e ok I0320 08:33:18.405399 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0320 08:33:18.405521 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0320 08:33:18.405571 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok I0320 08:33:18.405571 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:18.405604 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } autoscaling-group:bastion.privatekopeio.example.com ok I0320 08:33:18.405652 32017 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0320 08:33:18.405487 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok route53-record:Z1AFAKE1ZON3YO/api.privatekopeio.example.com ok I0320 08:33:18.405671 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0320 08:33:18.405720 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0320 08:33:18.405738 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0320 08:33:18.405657 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } load-balancer:api-privatekopeio-example-tl2bv8 ok W0320 08:33:18.405795 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.405768 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0320 08:33:18.405835 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0320 08:33:18.405906 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } I0320 08:33:18.405887 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } volume:vol-1 ok I0320 08:33:18.405993 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0320 08:33:18.406014 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:18.406049 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0320 08:33:18.406100 32017 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0320 08:33:18.406117 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0320 08:33:18.406426 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.406447 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-5" } security-group:sg-5 ok autoscaling-config:lt-3 ok I0320 08:33:18.406495 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0320 08:33:18.406563 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-2 ok autoscaling-config:lt-1 ok I0320 08:33:18.406678 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:18.406730 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0320 08:33:18.406827 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.406849 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:18.406882 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0320 08:33:18.406929 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:18.406986 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0320 08:33:18.407036 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0320 08:33:18.407081 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:18.407129 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:18.407202 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.407215 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0320 08:33:18.407293 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0320 08:33:18.407339 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:18.407428 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0320 08:33:18.407525 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:18.407611 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:18.407949 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecyclePrivateKopeio (0.50s) === RUN TestLifecycleSharedVPC I0320 08:33:18.408444 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:18.408513 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:18.408556 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:18.408607 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:18.408647 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:18.408676 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:18.408706 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:18.408739 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:18.408784 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:18.408842 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster sharedvpc.example.com I0320 08:33:18.418052 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.420095 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.420193 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.493183 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.595700 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.602727 32017 executor.go:111] Tasks: 0 done / 77 total; 42 can run I0320 08:33:18.603030 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" W0320 08:33:18.603292 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:18.603252 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] }] } W0320 08:33:18.603445 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:18.603365 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.sharedvpc.example.com", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] } I0320 08:33:18.603358 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:18.603492 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:18.603453 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:18.603585 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:18.603629 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:18.603540 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:18.603788 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:18.603652 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.603832 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:18.603602 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0320 08:33:18.603587 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:18.603967 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:18.603855 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.604035 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.sharedvpc.example.com", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedvpc.example.com" }] } I0320 08:33:18.604055 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.604183 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0320 08:33:18.604253 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0320 08:33:18.604449 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:18.604538 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:18.604567 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:18.604629 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:18.604851 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:18.638859 32017 executor.go:111] Tasks: 42 done / 77 total; 17 can run I0320 08:33:18.639083 32017 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0320 08:33:18.639121 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.639288 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } W0320 08:33:18.639322 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder I0320 08:33:18.639278 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } W0320 08:33:18.639368 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" I0320 08:33:18.639428 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } W0320 08:33:18.639478 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" I0320 08:33:18.639498 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0320 08:33:18.639480 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } W0320 08:33:18.639721 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder I0320 08:33:18.639770 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0320 08:33:18.639789 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } W0320 08:33:18.640024 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder I0320 08:33:18.639992 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:18.640082 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:18.640133 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:18.640120 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0320 08:33:18.640194 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } W0320 08:33:18.640447 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder I0320 08:33:18.640419 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } W0320 08:33:18.640512 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" W0320 08:33:18.640551 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" I0320 08:33:18.640476 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:18.640649 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:18.640704 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0320 08:33:18.640827 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:18.640932 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:18.641009 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:18.641087 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:18.641277 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0320 08:33:18.641637 32017 executor.go:111] Tasks: 59 done / 77 total; 16 can run I0320 08:33:18.641757 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.641845 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.641928 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.642129 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.642314 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.642394 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.642584 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.642667 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.642851 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:18.642920 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.643029 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.643141 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.643236 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.643349 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.643433 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.643541 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.643628 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:18.643694 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.643774 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.643871 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:18.643948 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:18.644021 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.644102 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.644184 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.644310 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.644430 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:18.644516 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:18.644570 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0320 08:33:18.644629 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.644750 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.644815 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:18.644923 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:18.644986 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:18.648610 32017 executor.go:111] Tasks: 75 done / 77 total; 2 can run I0320 08:33:18.648941 32017 executor.go:111] Tasks: 77 done / 77 total; 0 can run I0320 08:33:18.649017 32017 dns.go:157] Checking DNS records I0320 08:33:18.649051 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.649106 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.649190 32017 dns.go:219] Pre-creating DNS records I0320 08:33:18.649241 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.653573 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.655676 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.655794 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.728453 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.831207 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.832576 32017 executor.go:111] Tasks: 0 done / 77 total; 42 can run I0320 08:33:18.832930 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.832980 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:18.833298 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:18.833401 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:18.833431 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:18.833466 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.833558 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:18.833676 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.835028 32017 executor.go:111] Tasks: 42 done / 77 total; 17 can run I0320 08:33:18.835243 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0320 08:33:18.835189 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.835341 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0320 08:33:18.835531 32017 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0320 08:33:18.835555 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } W0320 08:33:18.835667 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder I0320 08:33:18.835604 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0320 08:33:18.835776 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:18.835820 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.835997 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:18.836249 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedvpc.example.com" for IAM policy builder W0320 08:33:18.836297 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/main" W0320 08:33:18.836317 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedvpc.example.com/backups/etcd/events" I0320 08:33:18.836940 32017 executor.go:111] Tasks: 59 done / 77 total; 16 can run I0320 08:33:18.837040 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.837183 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.837315 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.837411 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.837492 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.837592 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.837720 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.837881 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.837984 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.838080 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.838197 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.838304 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.838451 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.838545 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.838635 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:18.838721 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:18.838834 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.838960 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.842450 32017 executor.go:111] Tasks: 75 done / 77 total; 2 can run I0320 08:33:18.842688 32017 executor.go:111] Tasks: 77 done / 77 total; 0 can run I0320 08:33:18.844437 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:18.844499 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:18.844533 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:18.844565 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:18.844595 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:18.844625 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:18.844658 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:18.844696 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:18.844733 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:18.844776 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:18.844807 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:18.844837 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:18.844872 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:18.844903 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:18.844937 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:18.844969 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:18.845006 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:18.845037 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:18.845070 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:18.845101 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:18.845135 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:18.845172 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:18.845987 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:18.846018 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:18.846052 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846099 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0320 08:33:18.846152 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846208 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846249 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846291 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846330 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0320 08:33:18.846377 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846434 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0320 08:33:18.846467 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0320 08:33:18.846509 32017 api.go:53] PageSize not implemented I0320 08:33:18.846534 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:18.846564 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:18.846583 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:18.846606 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:18.846624 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:18.846674 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.846706 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:18.846751 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:18.846788 32017 iamrole.go:90] ListRoles: { } I0320 08:33:18.846833 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:18.846873 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:18.846903 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:18.847305 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:18.847323 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0320 08:33:18.847397 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0320 08:33:18.847374 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:18.847415 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0320 08:33:18.847450 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } autoscaling-group:nodes.sharedvpc.example.com ok iam-role:nodes.sharedvpc.example.com ok I0320 08:33:18.847486 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0320 08:33:18.847541 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0320 08:33:18.847437 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } I0320 08:33:18.847576 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0320 08:33:18.847663 32017 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0320 08:33:18.847683 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } W0320 08:33:18.847624 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.847754 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:18.847463 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/api.internal.sharedvpc.example.com. ok I0320 08:33:18.847720 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } I0320 08:33:18.847800 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } iam-role:masters.sharedvpc.example.com ok I0320 08:33:18.847854 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0320 08:33:18.847906 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0320 08:33:18.847862 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0320 08:33:18.847977 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:18.847998 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:18.848031 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0320 08:33:18.848085 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok autoscaling-config:lt-1 ok I0320 08:33:18.848219 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:18.848302 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:18.848598 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleSharedVPC (0.44s) === RUN TestLifecycleComplex I0320 08:33:18.849102 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:18.849168 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:18.849204 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:18.849248 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:18.849287 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:18.849313 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:18.849342 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:18.849374 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:18.849400 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:18.849452 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster complex.example.com I0320 08:33:18.868256 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:18.870891 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.870996 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:18.943405 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.043401 32017 iamrole.go:90] ListRoles: { } I0320 08:33:19.053288 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run I0320 08:33:19.053512 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0320 08:33:19.053693 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:19.053692 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.053669 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } W0320 08:33:19.054088 32017 api.go:53] PageSize not implemented W0320 08:33:19.054141 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:19.054091 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:19.054089 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:19.054061 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", PermissionsBoundary: "arn:aws:iam:00000000000:policy/boundaries", RoleName: "nodes.complex.example.com", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0320 08:33:19.054421 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:19.054461 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:19.054556 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:19.054542 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:19.054617 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:19.054449 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0320 08:33:19.054764 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:19.054835 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" W0320 08:33:19.054866 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:19.054896 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:19.054719 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:19.054756 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:19.055036 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.055521 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.055670 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:19.055754 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:19.055786 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.056347 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0320 08:33:19.054942 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", PermissionsBoundary: "arn:aws:iam:00000000000:policy/boundaries", RoleName: "masters.complex.example.com", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0320 08:33:19.056456 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0320 08:33:19.056538 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0320 08:33:19.056667 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:19.056785 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:19.056843 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:19.056892 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:19.056965 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.091987 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run I0320 08:33:19.092279 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0320 08:33:19.092402 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:19.092444 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:19.092326 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:19.092293 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } W0320 08:33:19.092570 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.092511 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } W0320 08:33:19.092676 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.092647 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:19.092667 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } W0320 08:33:19.092773 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:19.092818 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.092770 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.092818 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.092902 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0320 08:33:19.092865 32017 targetgroups.go:94] CreateTargetGroup { HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0320 08:33:19.092817 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0320 08:33:19.092962 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.092956 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0320 08:33:19.093034 32017 targetgroups.go:94] CreateTargetGroup { HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0320 08:33:19.093131 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:19.093202 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.093352 32017 vpcs.go:239] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0320 08:33:19.093414 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.093514 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0320 08:33:19.093581 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.093649 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0320 08:33:19.093754 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } W0320 08:33:19.093767 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:33:19.093811 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:19.093837 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.093795 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.093894 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.093993 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:19.094090 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.094086 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0320 08:33:19.094179 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "api-elb.complex.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:19.094277 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:19.094433 32017 vpcs.go:239] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0320 08:33:19.094496 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0320 08:33:19.094551 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0320 08:33:19.094704 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0320 08:33:19.094449 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0320 08:33:19.094848 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:19.094936 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:19.095041 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:19.095097 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:19.095138 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:19.095278 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0320 08:33:19.095314 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0320 08:33:19.095410 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:19.095531 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:19.095582 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:19.095631 32017 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] } I0320 08:33:19.095719 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:19.095819 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0320 08:33:19.095917 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:19.095968 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:19.096059 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:33:19.096218 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.096329 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.096446 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.096537 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:19.096622 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:19.096576 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.096660 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0320 08:33:19.096742 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.096755 32017 loadbalancers.go:80] CreateLoadBalancer v2 { Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-1" }], Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ], Type: "network" } I0320 08:33:19.096917 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }] } I0320 08:33:19.096926 32017 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0320 08:33:19.097025 32017 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0320 08:33:19.096992 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097094 32017 loadbalancers.go:157] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" }], LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.097200 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0320 08:33:19.097284 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.097432 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0320 08:33:19.097492 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.097590 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097666 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097731 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:19.097784 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097851 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097920 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.097995 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.098066 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.098137 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.098207 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.098291 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.098353 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.098428 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.098497 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0320 08:33:19.098553 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.098629 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.098699 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.098795 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.098865 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.098939 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.099007 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.099080 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.099149 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.099224 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.099297 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.099361 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.099428 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0320 08:33:19.099492 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.099541 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:19.099598 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.099680 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0320 08:33:19.099733 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 8443 }] } I0320 08:33:19.099793 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:85a3::/48" }], ToPort: 22 }] } I0320 08:33:19.099845 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }] } I0320 08:33:19.099896 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0320 08:33:19.099940 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 443 }] } I0320 08:33:19.099991 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:19.100044 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0320 08:33:19.100084 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0320 08:33:19.100116 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:19.100161 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:85a3::/48" }], ToPort: 22 }] } I0320 08:33:19.100210 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 4 }] } I0320 08:33:19.100260 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0320 08:33:19.100307 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:19.100360 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:19.100406 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0320 08:33:19.100454 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0320 08:33:19.100501 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }] } I0320 08:33:19.100550 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-1", TransitGatewayId: "tgw-123456" } I0320 08:33:19.100596 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:19.100652 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:19.100700 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:19.100740 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:19.100789 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.100834 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0320 08:33:19.100879 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0320 08:33:19.100918 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0320 08:33:19.104179 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:33:19.104374 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.104546 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.104678 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:19.104734 32017 dns.go:157] Checking DNS records I0320 08:33:19.104753 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.104783 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:19.104832 32017 dns.go:219] Pre-creating DNS records I0320 08:33:19.104855 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:19.110256 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.112882 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.112986 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.185238 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.290506 32017 iamrole.go:90] ListRoles: { } I0320 08:33:19.292508 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run I0320 08:33:19.292765 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.292973 32017 api.go:53] PageSize not implemented I0320 08:33:19.292919 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.293117 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:19.293163 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:19.293219 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.293225 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:19.293267 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:19.293396 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.293747 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0320 08:33:19.293944 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.294170 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0320 08:33:19.294346 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:19.295074 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run I0320 08:33:19.295309 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:19.295247 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0320 08:33:19.295399 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:19.296176 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com W0320 08:33:19.296534 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.296516 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:19.296754 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:19.296804 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.295523 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.296909 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:19.297006 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:19.297115 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.297130 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.297353 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.297510 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:19.297705 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.297866 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.298048 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.298221 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } W0320 08:33:19.298413 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:33:19.298525 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" I0320 08:33:19.298410 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.298564 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.298629 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:19.298711 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:19.301348 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:33:19.301508 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.301614 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.301766 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:19.301861 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:19.301764 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.301881 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.301930 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.301970 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.301943 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.302019 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.302054 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.302085 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.302045 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.302213 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.302316 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.302418 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.302513 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.302607 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.302702 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.302798 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.302889 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.302978 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.303061 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.303148 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.303237 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.303330 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.303419 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.303510 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.303616 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.303728 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.303882 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.303983 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304078 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304192 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.304299 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.304415 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304512 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.304600 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.304690 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304780 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304868 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.304957 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.305078 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.308821 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:33:19.308924 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.309011 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:19.309042 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:19.309071 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.309152 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run lifecycle_integration_test.go:236: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0320 08:33:19.315037 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.317478 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.325661 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.328148 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.328250 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.402163 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.505197 32017 iamrole.go:90] ListRoles: { } I0320 08:33:19.514725 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run I0320 08:33:19.514932 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:19.515154 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:19.515403 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.515656 32017 api.go:53] PageSize not implemented I0320 08:33:19.515686 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.515887 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:19.516037 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.516190 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0320 08:33:19.516313 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.516416 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:19.516444 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:19.516491 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0320 08:33:19.516682 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.518148 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run I0320 08:33:19.518324 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.518524 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:19.518677 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:19.518858 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:19.518778 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:19.518955 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.518902 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.519038 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:19.519164 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } W0320 08:33:19.519209 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.519191 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.519329 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.519481 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0320 08:33:19.519723 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:19.520043 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:19.520122 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:19.520200 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.520289 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } W0320 08:33:19.520420 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:19.520672 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.520575 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.520924 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.522585 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.522713 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:19.522755 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:19.523054 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:33:19.523209 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.523322 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.523486 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.523545 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:19.523641 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:19.523664 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.523611 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.523715 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.523789 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.523848 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.523893 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.523929 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.523960 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.523931 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.524057 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.524144 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0320 08:33:19.524182 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.524214 32017 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0320 08:33:19.524174 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.524245 32017 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0320 08:33:19.524276 32017 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0320 08:33:19.524301 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.524366 32017 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0320 08:33:19.524428 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.524422 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.524462 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.524521 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.524631 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.524763 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.524891 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525028 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525135 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525247 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525342 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525457 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525564 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525658 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525752 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.525843 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.525936 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.526047 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.526155 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.526264 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.526371 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.526481 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.526582 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.526670 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.526768 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.526845 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.526922 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.527160 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.532302 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:33:19.532501 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.532607 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:19.532634 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:19.532661 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.532766 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0320 08:33:19.532822 32017 dns.go:157] Checking DNS records I0320 08:33:19.532839 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.532867 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:19.538774 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.541748 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.541857 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.614939 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.718320 32017 iamrole.go:90] ListRoles: { } I0320 08:33:19.720368 32017 executor.go:111] Tasks: 0 done / 110 total; 47 can run W0320 08:33:19.720904 32017 api.go:53] PageSize not implemented I0320 08:33:19.721031 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0320 08:33:19.721057 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:19.721188 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.721378 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0320 08:33:19.721493 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:19.721593 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.721730 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.721830 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:19.721859 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:19.721923 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:19.722114 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.722296 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.722907 32017 executor.go:111] Tasks: 47 done / 110 total; 26 can run I0320 08:33:19.723154 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:19.723208 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:19.723339 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.723296 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.723291 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:19.723461 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:19.723456 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:19.723544 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.723530 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.723748 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:19.723686 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.723751 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.723861 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.723956 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.724079 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:19.724224 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } W0320 08:33:19.724275 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:33:19.724329 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" I0320 08:33:19.724272 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.724352 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.724436 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.724579 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0320 08:33:19.724717 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0320 08:33:19.724848 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:19.725008 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:19.725296 32017 executor.go:111] Tasks: 73 done / 110 total; 34 can run I0320 08:33:19.725456 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.725573 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.725624 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:19.725696 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:19.725719 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.725684 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.725767 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.725806 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.725850 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.725828 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.725886 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.725921 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.725929 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.726018 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.726113 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.726218 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.726323 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.726405 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.726536 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.726688 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.726806 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.726997 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.727125 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.727223 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.727741 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.727840 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.727932 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728026 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728116 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728203 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.728291 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728382 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728469 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.728555 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728643 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728736 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.728856 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.728950 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.729035 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.729127 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.729214 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.729301 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.729389 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.731435 32017 executor.go:111] Tasks: 107 done / 110 total; 3 can run I0320 08:33:19.731590 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.731688 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:19.731720 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:19.731750 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.731850 32017 executor.go:111] Tasks: 110 done / 110 total; 0 can run lifecycle_integration_test.go:236: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0320 08:33:19.735743 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.738115 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.745951 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.748531 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.748630 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.822447 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.924880 32017 iamrole.go:90] ListRoles: { } I0320 08:33:19.934241 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run I0320 08:33:19.934528 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.934653 32017 api.go:53] PageSize not implemented I0320 08:33:19.934715 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.934761 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:19.934827 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:19.934860 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:19.934917 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:19.935017 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.935223 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.935272 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0320 08:33:19.935385 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:19.935521 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.936396 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:19.936537 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.936645 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:19.936664 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:19.936747 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.936797 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.936925 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:19.936825 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:19.936963 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:19.936971 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.936931 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:19.937014 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.937116 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.937247 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:19.937372 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.937479 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:19.937633 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } W0320 08:33:19.937682 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:19.937698 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } W0320 08:33:19.937733 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:19.937756 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:19.937743 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0320 08:33:19.937884 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0320 08:33:19.938010 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:19.938159 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:19.938205 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:19.938420 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:19.938555 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.938639 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.938735 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.938778 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:19.938867 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:19.938885 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.938932 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.938875 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.938967 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.939006 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:19.939040 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:19.939022 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.939072 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:19.939140 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.939239 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.939384 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.939494 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.939589 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.939679 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.939769 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:19.939858 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.939942 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940037 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940127 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940217 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.940304 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.940392 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940478 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940571 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940659 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.940763 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940857 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.940950 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.941039 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.941132 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.941221 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:19.941304 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.941411 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.941524 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.941679 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:19.941782 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:19.941875 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.941997 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.946097 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.946176 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.950298 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:19.950393 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:19.950476 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:19.950500 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:19.950524 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:19.950735 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0320 08:33:19.950801 32017 dns.go:157] Checking DNS records I0320 08:33:19.950822 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.950857 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:19.957835 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:19.962732 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:19.962851 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.035628 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.136828 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.138961 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run W0320 08:33:20.139239 32017 api.go:53] PageSize not implemented I0320 08:33:20.139297 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0320 08:33:20.139468 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.139667 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.139739 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:20.139799 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:20.139954 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.143915 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:20.144220 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.144996 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:20.145127 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:20.145204 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.147399 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:20.147560 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.147584 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.147762 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.147804 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } W0320 08:33:20.147890 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.147903 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.147903 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.148064 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:20.148055 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.148087 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:20.148209 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.148230 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.148316 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:20.148402 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:33:20.148456 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" I0320 08:33:20.148399 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } W0320 08:33:20.148479 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:20.148545 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.148589 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.148741 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.148860 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.149001 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:20.149150 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:20.149195 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:20.149438 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.149724 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:20.149879 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150016 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150127 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150201 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.150274 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.150267 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.150291 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.150373 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.150451 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.150491 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.150531 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.150566 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.150596 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.150551 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150676 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150781 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.150876 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.150970 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151065 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.151157 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.151243 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151334 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.151417 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151505 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151592 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151678 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.151763 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.151859 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.151953 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.152043 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.152173 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.152269 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.152363 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.152452 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.152542 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.152628 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.152715 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.152803 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.152920 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.153030 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.153157 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.153213 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.153320 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.157147 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:20.157247 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:20.157334 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:20.157360 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:20.157384 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.157501 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run lifecycle_integration_test.go:259: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0320 08:33:20.162571 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.164820 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.164901 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.171366 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.173893 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.173986 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.174045 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.247196 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.354871 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.364372 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run I0320 08:33:20.364689 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:20.364810 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:20.364887 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0320 08:33:20.365049 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:20.365140 32017 api.go:53] PageSize not implemented I0320 08:33:20.365196 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.367024 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.367215 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:20.367256 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:20.367325 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.367671 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:20.367851 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.369085 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:20.369349 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:20.369635 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:20.369656 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.369635 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:20.369961 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.370013 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:20.369994 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } W0320 08:33:20.370949 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.370389 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:20.370875 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.371107 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.371186 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.372122 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:20.372471 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.372423 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } W0320 08:33:20.372560 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:20.372603 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:20.372705 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.372786 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.372944 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.373054 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.373124 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:20.373245 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.373320 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.373391 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.373464 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:20.373607 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.373705 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.373872 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.373890 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.374045 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.374068 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.374039 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.374125 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.374165 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.374207 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.374217 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.374240 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.374270 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.374343 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.374484 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.374581 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.374676 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.374767 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.374860 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.374951 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.375086 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.375261 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.375400 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.375580 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.375728 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.375881 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.375976 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.376066 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.376155 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.376238 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.376325 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.376412 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.376500 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.376612 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.376723 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.376860 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.376971 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.377058 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.377154 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.377245 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.377334 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.377419 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.377525 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.381324 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:20.381495 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:20.381597 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:20.381626 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:20.381650 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.381762 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0320 08:33:20.381822 32017 dns.go:157] Checking DNS records I0320 08:33:20.381843 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.381874 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:20.387147 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.389750 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.389855 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.389917 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.461640 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.558076 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.560281 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run I0320 08:33:20.560500 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0320 08:33:20.560613 32017 api.go:53] PageSize not implemented I0320 08:33:20.560619 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:20.560679 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.560871 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.561017 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:20.561053 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:20.561115 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:20.561259 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:20.561368 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.561528 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.561574 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.562748 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:20.562980 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.562894 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.563062 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:20.563065 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:20.563184 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:20.563151 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.563240 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.563343 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:20.563390 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:20.563469 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.563471 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.563516 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.563603 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.563730 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:20.563918 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.564001 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:20.564119 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder W0320 08:33:20.564195 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:20.564235 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:20.564150 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:20.564380 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:20.564436 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.564517 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.564613 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.564707 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.564972 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:20.565074 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.565104 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.565189 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.565213 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.565178 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.565258 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.565318 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.565350 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.565435 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.565414 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.565480 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.565512 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.565529 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.565620 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.565708 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.565796 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.565882 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.565970 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566055 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.566143 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566226 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.566310 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566388 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566472 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566552 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.566660 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.566740 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.566806 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.566880 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.566955 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567020 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567084 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567150 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.567228 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567297 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.567363 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.567437 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.567504 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567578 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567648 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.567719 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.567862 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.568121 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.571954 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:20.572105 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:20.572205 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:20.572230 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:20.572255 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.572361 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run lifecycle_integration_test.go:259: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0320 08:33:20.575579 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.577777 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.577857 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.584213 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.586700 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.586807 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.586864 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.660018 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.759216 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.768812 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run I0320 08:33:20.769181 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.769247 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0320 08:33:20.769405 32017 api.go:53] PageSize not implemented I0320 08:33:20.769366 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.769496 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:20.769727 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:20.769882 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0320 08:33:20.770004 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:20.770050 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:20.770093 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.770150 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0320 08:33:20.770315 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0320 08:33:20.770958 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:20.771085 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.771228 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.771291 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:20.771229 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.771366 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:20.771389 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:20.771459 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.771541 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:20.771505 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0320 08:33:20.771610 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } W0320 08:33:20.771649 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.771701 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.771756 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0320 08:33:20.771908 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } W0320 08:33:20.772053 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.772022 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:20.772127 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:20.772152 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:20.772175 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.772333 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.772478 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.772571 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0320 08:33:20.772700 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.772745 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.772871 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.772999 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:20.773131 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.773245 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.773346 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.773393 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.773463 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.773483 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.773529 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.773568 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.773607 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.773497 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.773641 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.773672 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.773678 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.773773 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.773941 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.774044 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774140 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774228 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.774315 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.774399 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.774488 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774578 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774661 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774747 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774831 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.774916 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.775016 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.775134 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.775289 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.775389 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.775511 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.775602 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.775685 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.775773 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.775858 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.775943 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.776028 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.776120 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.776208 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.776290 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.776376 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.776470 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.776591 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.780449 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:20.780558 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:20.780649 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:20.780673 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:20.780699 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.780896 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0320 08:33:20.780968 32017 dns.go:157] Checking DNS records I0320 08:33:20.780990 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.781026 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:20.786326 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.788946 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.789050 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.789109 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.861694 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.962188 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.964246 32017 executor.go:111] Tasks: 0 done / 109 total; 46 can run I0320 08:33:20.964512 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0320 08:33:20.964649 32017 api.go:53] PageSize not implemented I0320 08:33:20.964900 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0320 08:33:20.965057 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:20.965093 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0320 08:33:20.965265 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.965475 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0320 08:33:20.965585 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.965692 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:20.965724 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:20.965790 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.966086 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.966355 32017 executor.go:111] Tasks: 46 done / 109 total; 26 can run I0320 08:33:20.966523 32017 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.966553 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.966560 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0320 08:33:20.966745 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.966688 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.966774 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0320 08:33:20.966818 32017 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0320 08:33:20.966829 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.966879 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.966956 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0320 08:33:20.967919 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.968025 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.968299 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } W0320 08:33:20.968476 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.968638 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } W0320 08:33:20.968986 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/complex.example.com" for IAM policy builder I0320 08:33:20.969057 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } W0320 08:33:20.969075 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/main" W0320 08:33:20.969216 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/complex.example.com/backups/etcd/events" I0320 08:33:20.969146 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.969362 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.969555 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.969721 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.969908 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:20.970144 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.970986 32017 executor.go:111] Tasks: 72 done / 109 total; 34 can run I0320 08:33:20.971224 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.971465 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.971256 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.971633 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.971656 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.972054 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.972493 32017 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.972552 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0320 08:33:20.972593 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0320 08:33:20.972623 32017 loadbalancers.go:143] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.971661 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.973486 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.973622 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.973705 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.973794 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.973865 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.973940 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:20.974022 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974093 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974169 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.974235 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.974308 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974373 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974443 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.974518 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:20.974591 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974669 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.974736 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.974803 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974867 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.974944 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.975014 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975084 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.975168 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975242 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975307 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.975385 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975478 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975549 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:20.975625 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:20.975693 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.975735 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.975921 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:20.980089 32017 executor.go:111] Tasks: 106 done / 109 total; 3 can run I0320 08:33:20.980190 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:20.980274 32017 dnsname.go:122] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0320 08:33:20.980299 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { } I0320 08:33:20.980323 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.980471 32017 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0320 08:33:20.980791 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:20.980858 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:20.980894 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:20.980925 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:20.980965 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:20.980999 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:20.981030 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:20.981063 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:20.981098 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:20.981139 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:20.981182 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:20.981213 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:20.981242 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:20.981277 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:20.981308 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:20.981343 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:20.981379 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:20.981413 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:20.981448 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:20.981484 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:20.981516 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:20.981553 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0320 08:33:20.981611 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:20.981642 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:20.981674 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:20.981710 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:20.981748 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:20.981783 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:20.983159 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:20.983188 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:20.983222 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983277 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0320 08:33:20.983340 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983399 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983447 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983503 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983552 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0320 08:33:20.983607 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983678 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0320 08:33:20.983718 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0320 08:33:20.983765 32017 api.go:53] PageSize not implemented I0320 08:33:20.983786 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:20.983812 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:20.983827 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0320 08:33:20.983867 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:20.983889 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:20.983908 32017 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0320 08:33:20.983976 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:20.984003 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:20.984048 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:20.984082 32017 iamrole.go:90] ListRoles: { } I0320 08:33:20.984125 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:20.984177 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:20.984224 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0320 08:33:20.984811 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0320 08:33:20.984886 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0320 08:33:20.984860 32017 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } target-group:arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5 ok I0320 08:33:20.984953 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:20.984949 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0320 08:33:20.984991 32017 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } target-group:arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4 ok I0320 08:33:20.985037 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0320 08:33:20.985062 32017 loadbalancers.go:195] DeleteLoadBalancer { LoadBalancerArn: "arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0320 08:33:20.985079 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } autoscaling-group:nodes.complex.example.com ok I0320 08:33:20.985127 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } load-balancer:arn:aws:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0320 08:33:20.985156 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0320 08:33:20.985017 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:85a3::/48" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } I0320 08:33:20.985207 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com W0320 08:33:20.985216 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:20.985030 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:20.985223 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } route53-record:Z1AFAKE1ZON3YO/kops-controller.internal.complex.example.com. ok I0320 08:33:20.985234 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0320 08:33:20.985251 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok iam-instance-profile:nodes.complex.example.com ok autoscaling-group:master-us-test-1a.masters.complex.example.com ok I0320 08:33:20.985270 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:20.985280 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0320 08:33:20.985356 32017 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0320 08:33:20.985368 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:20.985385 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0320 08:33:20.985456 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } I0320 08:33:20.985448 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } iam-role:masters.complex.example.com ok volume:vol-2 ok I0320 08:33:20.985536 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:20.985628 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 8443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:85a3::/48" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "2001:0:8500::/40" }], ToPort: 4 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0320 08:33:20.986107 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:20.986146 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0320 08:33:20.986243 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0320 08:33:20.986365 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0320 08:33:20.986406 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-1 ok I0320 08:33:20.986584 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:20.986674 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:20.986767 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0320 08:33:20.986851 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:20.986933 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:20.987266 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleComplex (2.14s) === RUN TestLifecycleExternalLB I0320 08:33:20.987756 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:20.987829 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:20.987872 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:20.987923 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:20.987963 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:20.987992 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:20.988023 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:20.988058 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:20.988085 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:20.988142 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster externallb.example.com I0320 08:33:20.999192 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.001245 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.001348 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.073195 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.172940 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.180720 32017 executor.go:111] Tasks: 0 done / 86 total; 50 can run I0320 08:33:21.181032 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" W0320 08:33:21.181079 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:21.181085 32017 api.go:53] PageSize not implemented W0320 08:33:21.181230 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:21.181281 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:21.181158 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0320 08:33:21.181187 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0320 08:33:21.181320 32017 api.go:53] PageSize not implemented W0320 08:33:21.181380 32017 api.go:53] PageSize not implemented I0320 08:33:21.181192 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:21.181382 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.181509 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0320 08:33:21.181416 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0320 08:33:21.181577 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.181633 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0320 08:33:21.181444 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:21.181664 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.181738 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.181828 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:21.181679 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0320 08:33:21.181798 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.181834 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:21.181831 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.181886 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0320 08:33:21.181836 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:21.181974 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0320 08:33:21.181944 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:21.181984 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:21.182117 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:21.181998 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0320 08:33:21.182052 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:21.182235 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:21.182184 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.182315 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.182455 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.182426 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:21.182579 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:21.182647 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:21.182682 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:21.182712 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:21.182763 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:21.182802 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0320 08:33:21.182987 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:21.183103 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:21.217838 32017 executor.go:111] Tasks: 50 done / 86 total; 18 can run I0320 08:33:21.218005 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } W0320 08:33:21.218167 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:21.218194 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:21.218267 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:21.218313 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" I0320 08:33:21.218179 32017 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0320 08:33:21.218229 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0320 08:33:21.218444 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder I0320 08:33:21.218530 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0320 08:33:21.218592 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0320 08:33:21.218567 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" }] }] } I0320 08:33:21.218739 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:21.218715 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0320 08:33:21.218892 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0320 08:33:21.218877 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:21.219144 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:21.219365 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:21.219442 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.219552 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } W0320 08:33:21.219514 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:21.219650 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:21.219679 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" I0320 08:33:21.219668 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0320 08:33:21.219709 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0320 08:33:21.220011 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.220207 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0320 08:33:21.220187 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.externallb.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:21.220289 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:21.220364 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:21.220435 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" } ] } I0320 08:33:21.220567 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:21.220707 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:21.220773 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:21.220843 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:21.220594 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0320 08:33:21.221069 32017 executor.go:111] Tasks: 68 done / 86 total; 16 can run I0320 08:33:21.221197 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:21.221309 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.221417 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0320 08:33:21.221520 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.221732 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.222045 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.222214 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:21.222409 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:21.222456 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.222532 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.222614 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.222682 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.222758 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.222828 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.222901 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.222975 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.223048 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.223125 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.223184 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:21.223247 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:21.223290 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:21.223344 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.223399 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:21.223453 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:21.223511 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:21.223569 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.223617 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.223677 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.223785 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.223876 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.223996 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.224114 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.224243 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.228414 32017 executor.go:111] Tasks: 84 done / 86 total; 2 can run I0320 08:33:21.228722 32017 executor.go:111] Tasks: 86 done / 86 total; 0 can run I0320 08:33:21.228799 32017 dns.go:157] Checking DNS records I0320 08:33:21.228826 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.228869 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.228939 32017 dns.go:219] Pre-creating DNS records I0320 08:33:21.228976 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.233487 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.235608 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.235722 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.308466 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.410604 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.412124 32017 executor.go:111] Tasks: 0 done / 86 total; 50 can run W0320 08:33:21.412469 32017 api.go:53] PageSize not implemented I0320 08:33:21.412550 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:21.412552 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } W0320 08:33:21.412716 32017 api.go:53] PageSize not implemented I0320 08:33:21.412677 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0320 08:33:21.412787 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0320 08:33:21.412718 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.412891 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.412964 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.412962 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.413036 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } W0320 08:33:21.413071 32017 api.go:53] PageSize not implemented I0320 08:33:21.413182 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.413195 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:21.413285 32017 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.413305 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.413403 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.413533 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.413708 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:21.413759 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:21.413845 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:21.414396 32017 executor.go:111] Tasks: 50 done / 86 total; 18 can run I0320 08:33:21.414635 32017 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0320 08:33:21.414518 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.415565 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0320 08:33:21.415518 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0320 08:33:21.415775 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:21.415915 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } W0320 08:33:21.416037 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder I0320 08:33:21.416007 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.416136 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.416257 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0320 08:33:21.416422 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } W0320 08:33:21.416754 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/externallb.example.com" for IAM policy builder W0320 08:33:21.416854 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/main" W0320 08:33:21.416892 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/externallb.example.com/backups/etcd/events" I0320 08:33:21.418148 32017 executor.go:111] Tasks: 68 done / 86 total; 16 can run I0320 08:33:21.418358 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:21.418559 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.418795 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.419424 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.419533 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.420455 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.420556 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.420644 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.420762 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.420852 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.420917 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.420982 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.421071 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:21.421137 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.421217 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.421285 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.421421 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.421650 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.425340 32017 executor.go:111] Tasks: 84 done / 86 total; 2 can run I0320 08:33:21.425636 32017 executor.go:111] Tasks: 86 done / 86 total; 0 can run I0320 08:33:21.427838 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:21.427949 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:21.428018 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:21.428086 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:21.428152 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:21.428220 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:21.428275 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:21.428310 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:21.428344 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:21.428378 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:21.428416 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:21.428460 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:21.428493 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:21.428525 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:21.428559 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:21.428590 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:21.428624 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:21.428657 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:21.428692 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:21.428723 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:21.428775 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:21.428812 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:21.428849 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:21.428886 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:21.428922 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:21.429692 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:21.429723 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:21.429763 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.429811 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0320 08:33:21.429865 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.429922 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.429969 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.430022 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.430062 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0320 08:33:21.430108 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.430159 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0320 08:33:21.430197 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0320 08:33:21.430245 32017 api.go:53] PageSize not implemented I0320 08:33:21.430267 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:21.430295 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:21.430313 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:21.430338 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:21.430353 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0320 08:33:21.430402 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.430433 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.430481 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:21.430531 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.430597 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:21.430672 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:21.430709 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:nodes.externallb.example.com ok I0320 08:33:21.431333 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } autoscaling-config:lt-1 ok I0320 08:33:21.431470 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0320 08:33:21.431287 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0320 08:33:21.431293 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/api.internal.externallb.example.com. ok I0320 08:33:21.431532 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0320 08:33:21.431561 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0320 08:33:21.431617 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } I0320 08:33:21.431616 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } volume:vol-2 ok autoscaling-config:lt-2 ok I0320 08:33:21.431681 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0320 08:33:21.431681 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok iam-instance-profile:masters.externallb.example.com ok I0320 08:33:21.431696 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0320 08:33:21.431809 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0320 08:33:21.431864 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0320 08:33:21.431740 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0320 08:33:21.431931 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:21.431932 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0320 08:33:21.431950 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:21.431970 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0320 08:33:21.431989 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:21.432027 32017 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0320 08:33:21.432042 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0320 08:33:21.432074 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0320 08:33:21.432037 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0320 08:33:21.432160 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:21.432181 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:21.432213 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:21.432310 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:21.432390 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:21.432469 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:21.432547 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:21.432824 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleExternalLB (0.45s) === RUN TestLifecycleSharedSubnet I0320 08:33:21.433333 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:21.433399 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:21.433436 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:21.433481 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:21.433519 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:21.433549 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:21.433578 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:21.433610 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:21.433637 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:21.433691 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster sharedsubnet.example.com I0320 08:33:21.443272 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.445273 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.445360 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.518822 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.627157 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.634010 32017 executor.go:111] Tasks: 0 done / 74 total; 42 can run W0320 08:33:21.634373 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:21.634304 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:21.634554 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:21.634617 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:21.634620 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:21.634655 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:21.634613 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:21.634810 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:21.634800 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.634668 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.sharedsubnet.example.com", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] } I0320 08:33:21.634839 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:21.634812 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:21.635023 32017 keypair.go:195] Issuing new certificate: "service-account" W0320 08:33:21.635058 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:21.635081 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:21.634895 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.634933 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0320 08:33:21.635095 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:21.635282 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.635330 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" }] } I0320 08:33:21.635466 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.635597 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0320 08:33:21.635720 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:21.635903 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:21.635982 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:21.636129 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:21.636187 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0320 08:33:21.666147 32017 executor.go:111] Tasks: 42 done / 74 total; 16 can run I0320 08:33:21.666299 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com W0320 08:33:21.666367 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:21.666431 32017 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0320 08:33:21.666496 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } W0320 08:33:21.666628 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:21.666619 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:21.666784 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:21.666829 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } W0320 08:33:21.666861 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:21.666899 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" I0320 08:33:21.666700 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0320 08:33:21.666903 32017 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] } I0320 08:33:21.667018 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0320 08:33:21.667022 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0320 08:33:21.667156 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0320 08:33:21.667275 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0320 08:33:21.667480 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0320 08:33:21.667607 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:21.667682 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:21.667779 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } W0320 08:33:21.667794 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder W0320 08:33:21.667840 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:21.667866 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" I0320 08:33:21.667836 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:21.667983 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:21.668471 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0320 08:33:21.668886 32017 executor.go:111] Tasks: 58 done / 74 total; 14 can run I0320 08:33:21.668996 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.669106 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.669327 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.669412 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.669556 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.669611 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.669743 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.669889 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.669999 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.670083 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.670294 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.670505 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:21.670611 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.670728 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.670867 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.671043 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.671212 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.671377 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:21.671509 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.671669 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:21.671794 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.671912 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:21.672020 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:21.672132 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.672217 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.672365 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.672434 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.672564 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:21.676684 32017 executor.go:111] Tasks: 72 done / 74 total; 2 can run I0320 08:33:21.677016 32017 executor.go:111] Tasks: 74 done / 74 total; 0 can run I0320 08:33:21.677077 32017 dns.go:157] Checking DNS records I0320 08:33:21.677100 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.677134 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.677188 32017 dns.go:219] Pre-creating DNS records I0320 08:33:21.677218 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.681957 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.684457 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.684561 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.758442 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.858529 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.859999 32017 executor.go:111] Tasks: 0 done / 74 total; 42 can run I0320 08:33:21.860305 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:21.860352 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:21.860419 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:21.860454 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:21.860502 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.860739 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.860944 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.861019 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:21.862032 32017 executor.go:111] Tasks: 42 done / 74 total; 16 can run I0320 08:33:21.862280 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0320 08:33:21.862359 32017 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0320 08:33:21.862306 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0320 08:33:21.862495 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } W0320 08:33:21.862619 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:21.862550 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0320 08:33:21.862785 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } W0320 08:33:21.862878 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/sharedsubnet.example.com" for IAM policy builder I0320 08:33:21.862859 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } W0320 08:33:21.862913 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/main" W0320 08:33:21.862928 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/sharedsubnet.example.com/backups/etcd/events" I0320 08:33:21.862962 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0320 08:33:21.863460 32017 executor.go:111] Tasks: 58 done / 74 total; 14 can run I0320 08:33:21.863550 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.863671 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.863774 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.863899 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.864058 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.867508 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.867655 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.867779 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.867920 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:21.868404 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.868546 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.868685 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.868829 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.868919 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.869017 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:21.869102 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:21.869506 32017 executor.go:111] Tasks: 72 done / 74 total; 2 can run I0320 08:33:21.869714 32017 executor.go:111] Tasks: 74 done / 74 total; 0 can run I0320 08:33:21.871593 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:21.871655 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:21.871688 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:21.871719 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:21.871755 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:21.871787 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:21.871829 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:21.871850 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:21.871894 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:21.871923 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:21.871972 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:21.872009 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:21.872044 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:21.872125 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:21.872184 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:21.872240 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:21.872289 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:21.872339 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:21.872397 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:21.872460 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:21.873500 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:21.873530 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:21.873567 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873615 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0320 08:33:21.873674 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873750 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873796 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873837 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873874 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0320 08:33:21.873912 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873957 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0320 08:33:21.873989 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0320 08:33:21.874029 32017 api.go:53] PageSize not implemented I0320 08:33:21.874048 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:21.874076 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:21.874095 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:21.874118 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:21.874138 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:21.874192 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.874223 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.874272 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:21.874306 32017 iamrole.go:90] ListRoles: { } I0320 08:33:21.874353 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:21.874391 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:21.874771 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok I0320 08:33:21.874818 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0320 08:33:21.874913 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0320 08:33:21.874934 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0320 08:33:21.874836 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:21.874973 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } W0320 08:33:21.874985 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions iam-role:nodes.sharedsubnet.example.com ok I0320 08:33:21.875008 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:21.875010 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0320 08:33:21.875072 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok I0320 08:33:21.875057 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } I0320 08:33:21.875108 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } autoscaling-group:nodes.sharedsubnet.example.com ok I0320 08:33:21.875158 32017 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com autoscaling-config:lt-1 ok volume:vol-1 ok I0320 08:33:21.875171 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0320 08:33:21.874942 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:21.875198 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } route53-record:Z1AFAKE1ZON3YO/api.sharedsubnet.example.com. ok iam-role:masters.sharedsubnet.example.com ok I0320 08:33:21.875221 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0320 08:33:21.875222 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:21.875264 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } iam-instance-profile:nodes.sharedsubnet.example.com ok I0320 08:33:21.875314 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:21.875417 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0320 08:33:21.875655 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:21.875689 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0320 08:33:21.875780 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0320 08:33:21.876155 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleSharedSubnet (0.44s) === RUN TestLifecyclePrivateSharedSubnet I0320 08:33:21.876818 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:21.876903 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:21.876971 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:21.877051 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:21.877114 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:21.877170 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:21.877223 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:21.877281 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:21.877331 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:21.877421 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster private-shared-subnet.example.com I0320 08:33:21.889509 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:21.891790 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:21.891901 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:21.892005 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:21.964836 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.066167 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.073880 32017 executor.go:111] Tasks: 0 done / 97 total; 45 can run I0320 08:33:22.074181 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:22.074405 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:22.074344 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:22.074527 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } W0320 08:33:22.074674 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:22.074545 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } W0320 08:33:22.074770 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:22.074794 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:22.074785 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0320 08:33:22.074797 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:22.075007 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:22.075006 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:22.075106 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.075030 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] } I0320 08:33:22.075197 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:22.075204 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.075258 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:22.075300 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:22.075312 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0320 08:33:22.075395 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:22.075477 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:22.075485 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:22.075520 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:22.075511 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.075566 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0320 08:33:22.075690 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0320 08:33:22.075764 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0320 08:33:22.076011 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:22.076141 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:22.102315 32017 executor.go:111] Tasks: 45 done / 97 total; 24 can run I0320 08:33:22.102836 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0320 08:33:22.102900 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0320 08:33:22.103008 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0320 08:33:22.103131 32017 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0320 08:33:22.103072 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0320 08:33:22.103229 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } W0320 08:33:22.103136 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:22.103302 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } W0320 08:33:22.103408 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:22.103447 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" I0320 08:33:22.103441 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.103502 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0320 08:33:22.103646 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:22.103821 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0320 08:33:22.103740 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion-elb.private-shared-subnet.example.com"] } ] } I0320 08:33:22.103948 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com W0320 08:33:22.103836 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:22.104110 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion ELB", GroupName: "bastion-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-elb.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } W0320 08:33:22.104244 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:22.104252 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0320 08:33:22.104331 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0320 08:33:22.104369 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:22.104485 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } W0320 08:33:22.104623 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:22.104596 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } W0320 08:33:22.104674 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:22.104697 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" I0320 08:33:22.104690 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:22.104825 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:22.104890 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.104928 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:22.104982 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:22.105020 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.105125 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:22.105167 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:22.105214 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.105336 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:22.105394 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.105461 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.105557 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:22.105611 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:22.105648 32017 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0320 08:33:22.105719 32017 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/role/elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" }] } I0320 08:33:22.105450 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0320 08:33:22.105872 32017 executor.go:111] Tasks: 69 done / 97 total; 24 can run I0320 08:33:22.105989 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } W0320 08:33:22.106103 32017 api.go:53] PageSize not implemented I0320 08:33:22.106083 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.106257 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.106359 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0320 08:33:22.106430 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.106522 32017 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] } I0320 08:33:22.106655 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0320 08:33:22.106679 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.106746 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0320 08:33:22.106868 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0320 08:33:22.106977 32017 api.go:53] PageSize not implemented I0320 08:33:22.106942 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.107002 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0320 08:33:22.107107 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.107226 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-su-5ol32q"] } I0320 08:33:22.107270 32017 tags.go:74] AddTags { LoadBalancerNames: ["bastion-private-shared-su-5ol32q"], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0320 08:33:22.107350 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-su-5ol32q"] } I0320 08:33:22.107392 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "TCP:22", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "bastion-private-shared-su-5ol32q" } I0320 08:33:22.107302 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.107455 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "bastion-private-shared-su-5ol32q" } I0320 08:33:22.107469 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:22.107543 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.107639 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.107736 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.107826 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.107909 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.107984 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.108062 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.108127 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:22.108192 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0320 08:33:22.108275 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.108419 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.108484 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.108559 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.108633 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.108712 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.108822 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.108876 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:22.108928 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.109018 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.109076 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:22.109130 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.109176 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:22.109230 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.109312 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:22.109361 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.109432 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.109478 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.109545 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:22.109605 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.109658 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:22.109713 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.109768 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.109907 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.110088 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.110245 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.113604 32017 executor.go:111] Tasks: 93 done / 97 total; 4 can run I0320 08:33:22.113798 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.113960 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.114101 32017 executor.go:111] Tasks: 97 done / 97 total; 0 can run I0320 08:33:22.114155 32017 dns.go:157] Checking DNS records I0320 08:33:22.114176 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.114205 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.114254 32017 dns.go:219] Pre-creating DNS records I0320 08:33:22.114276 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.118922 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.121503 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.121652 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.121912 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.194995 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.294736 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.296393 32017 executor.go:111] Tasks: 0 done / 97 total; 45 can run I0320 08:33:22.296601 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.296747 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:22.296865 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:22.296896 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:22.296935 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.297248 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.298122 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.297159 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:22.304162 32017 executor.go:111] Tasks: 45 done / 97 total; 24 can run I0320 08:33:22.304345 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0320 08:33:22.304339 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0320 08:33:22.304534 32017 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0320 08:33:22.304447 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0320 08:33:22.304598 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com W0320 08:33:22.304704 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder I0320 08:33:22.304645 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0320 08:33:22.304835 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0320 08:33:22.305117 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.305193 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.305256 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["bastion-elb.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion-elb.private-shared-subnet.example.com"] } ] } W0320 08:33:22.305441 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-subnet.example.com" for IAM policy builder W0320 08:33:22.305496 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/main" W0320 08:33:22.305522 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-subnet.example.com/backups/etcd/events" I0320 08:33:22.305417 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:22.305578 32017 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0320 08:33:22.305701 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0320 08:33:22.305845 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:22.305904 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:22.306057 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:22.306216 32017 executor.go:111] Tasks: 69 done / 97 total; 24 can run I0320 08:33:22.306304 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } W0320 08:33:22.306426 32017 api.go:53] PageSize not implemented I0320 08:33:22.306392 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.306471 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"] } I0320 08:33:22.306479 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.306599 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0320 08:33:22.306648 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0320 08:33:22.306595 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } W0320 08:33:22.306750 32017 api.go:53] PageSize not implemented I0320 08:33:22.306756 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.306769 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-su-5ol32q","api-private-shared-subnet-n2f8ak"] } I0320 08:33:22.306842 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-su-5ol32q"] } I0320 08:33:22.306874 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "bastion-private-shared-su-5ol32q" } I0320 08:33:22.306854 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.306947 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.307084 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.307226 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.307356 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.307492 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.307629 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.307766 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.307936 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.308036 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.308141 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.308232 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.308330 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.308415 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.308495 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.308592 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.308720 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.309019 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.309163 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.309226 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.313242 32017 executor.go:111] Tasks: 93 done / 97 total; 4 can run W0320 08:33:22.313368 32017 api.go:53] PageSize not implemented I0320 08:33:22.313362 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.313399 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"] } I0320 08:33:22.313464 32017 dnsname.go:122] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0320 08:33:22.313493 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } W0320 08:33:22.313538 32017 api.go:53] PageSize not implemented I0320 08:33:22.313570 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"] } I0320 08:33:22.313776 32017 executor.go:111] Tasks: 97 done / 97 total; 0 can run I0320 08:33:22.316050 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:22.316109 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:22.316143 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:22.316172 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:22.316207 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:22.316239 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:22.316270 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:22.316306 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:22.316341 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:22.316378 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0320 08:33:22.316417 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:22.316448 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:22.316478 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:22.316510 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:22.316543 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:22.316576 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:22.316606 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:22.316639 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:22.316671 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:22.316705 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:22.316736 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:22.316767 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:22.316801 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:22.316835 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:22.317740 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:22.317769 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:22.317808 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.317883 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0320 08:33:22.317956 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318013 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318057 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318099 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318133 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0320 08:33:22.318170 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318217 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0320 08:33:22.318251 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0320 08:33:22.318288 32017 api.go:53] PageSize not implemented I0320 08:33:22.318303 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak","bastion-private-shared-su-5ol32q"] } I0320 08:33:22.318355 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:22.318382 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:22.318401 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:22.318424 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:22.318441 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:22.318503 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.318533 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.318583 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:22.318618 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.318663 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:22.318706 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:22.319273 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0320 08:33:22.319342 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0320 08:33:22.319311 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok I0320 08:33:22.319361 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0320 08:33:22.319331 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok I0320 08:33:22.319392 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0320 08:33:22.319426 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0320 08:33:22.319482 32017 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0320 08:33:22.319472 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "bastion-private-shared-su-5ol32q" } load-balancer:bastion-private-shared-su-5ol32q ok I0320 08:33:22.319505 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0320 08:33:22.319412 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } I0320 08:33:22.319592 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } W0320 08:33:22.319612 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions autoscaling-group:bastion.private-shared-subnet.example.com ok I0320 08:33:22.319638 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-5" } security-group:sg-5 ok I0320 08:33:22.319623 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } autoscaling-group:nodes.private-shared-subnet.example.com ok I0320 08:33:22.319673 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } iam-instance-profile:bastions.private-shared-subnet.example.com ok I0320 08:33:22.319526 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/api.internal.private-shared-subnet.example.com. ok I0320 08:33:22.319695 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok I0320 08:33:22.319731 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:22.319782 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } W0320 08:33:22.319816 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.319838 32017 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0320 08:33:22.319850 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } I0320 08:33:22.319854 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } security-group:sg-3 ok I0320 08:33:22.319885 32017 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0320 08:33:22.319890 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-3 ok I0320 08:33:22.319926 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0320 08:33:22.319964 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.319999 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0320 08:33:22.320031 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0320 08:33:22.320060 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok I0320 08:33:22.320027 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-5" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0320 08:33:22.320137 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.320152 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0320 08:33:22.320195 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:22.320249 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0320 08:33:22.320355 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:22.320415 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:22.320494 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.320514 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:22.320548 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.320599 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0320 08:33:22.320684 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.320697 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:22.320982 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecyclePrivateSharedSubnet (0.44s) === RUN TestLifecyclePrivateSharedIP I0320 08:33:22.321464 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:22.321533 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:22.321570 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:22.321615 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:22.321653 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:22.321680 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:22.321706 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:22.321735 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:22.321761 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:22.321816 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster private-shared-ip.example.com I0320 08:33:22.333483 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.335637 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.335726 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.335784 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.409348 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.515379 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.523756 32017 executor.go:111] Tasks: 0 done / 105 total; 45 can run W0320 08:33:22.524053 32017 vfs_castore.go:612] CA private key was not found W0320 08:33:22.524179 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:22.524207 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:22.524221 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:22.524255 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0320 08:33:22.524545 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.524482 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" }] } I0320 08:33:22.524724 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:22.524759 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:22.524646 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.524068 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:22.524774 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:22.524877 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:22.524809 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0320 08:33:22.524839 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] }] } I0320 08:33:22.525040 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:22.525064 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:22.525113 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.525157 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0320 08:33:22.525301 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0320 08:33:22.525499 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:22.525464 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0320 08:33:22.525587 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:22.525617 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:22.525609 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0320 08:33:22.525661 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:22.525793 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:22.525846 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:22.525956 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:22.559406 32017 executor.go:111] Tasks: 45 done / 105 total; 26 can run I0320 08:33:22.559585 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0320 08:33:22.559564 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0320 08:33:22.559752 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0320 08:33:22.559754 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0320 08:33:22.559880 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0320 08:33:22.559972 32017 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0320 08:33:22.559953 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } W0320 08:33:22.560104 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:22.560139 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0320 08:33:22.560163 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-12345678" } I0320 08:33:22.560163 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } W0320 08:33:22.560364 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder W0320 08:33:22.560411 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:22.560376 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } W0320 08:33:22.560465 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" I0320 08:33:22.560465 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } W0320 08:33:22.560491 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" I0320 08:33:22.560441 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0320 08:33:22.560519 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.560553 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0320 08:33:22.560560 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.560630 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0320 08:33:22.560653 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0320 08:33:22.560720 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.560822 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.560856 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0320 08:33:22.560921 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0320 08:33:22.561039 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:22.561113 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] }] } W0320 08:33:22.561258 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:22.561210 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["bastion-elb.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion-elb.private-shared-ip.example.com"] } ] } W0320 08:33:22.561302 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:22.561325 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" I0320 08:33:22.561316 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.561303 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0320 08:33:22.561415 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:22.561535 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0320 08:33:22.561552 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:22.561654 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:22.561705 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:22.561753 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" } ] } I0320 08:33:22.561847 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.561935 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:22.561977 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.562011 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:22.562061 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:22.562131 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:22.561896 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0320 08:33:22.562233 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion ELB", GroupName: "bastion-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0320 08:33:22.562338 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:22.562388 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:22.562443 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:22.562500 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:22.562546 32017 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" } ] } I0320 08:33:22.562671 32017 executor.go:111] Tasks: 71 done / 105 total; 28 can run W0320 08:33:22.562839 32017 api.go:53] PageSize not implemented I0320 08:33:22.562812 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.562910 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.562981 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph"] } I0320 08:33:22.563011 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.563074 32017 tags.go:74] AddTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph"], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0320 08:33:22.563144 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph"] } I0320 08:33:22.563177 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "TCP:22", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "bastion-private-shared-ip-eepmph" } I0320 08:33:22.563126 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.563232 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "bastion-private-shared-ip-eepmph" } W0320 08:33:22.563303 32017 api.go:53] PageSize not implemented I0320 08:33:22.563318 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph"] } I0320 08:33:22.563324 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.563487 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.563507 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.563525 32017 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] } I0320 08:33:22.563581 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.563588 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.563612 32017 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0320 08:33:22.563729 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:22.563769 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:22.563744 32017 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: false, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0320 08:33:22.563811 32017 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0320 08:33:22.563889 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:22.563966 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:22.564120 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-2" } I0320 08:33:22.564174 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564255 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.564317 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:22.564387 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.564461 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564539 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.564607 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564681 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564747 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564820 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.564886 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.564960 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.565030 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:22.565088 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.565163 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.565229 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.565300 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.565368 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.565444 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:22.565505 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:22.565545 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.565600 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.565688 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0320 08:33:22.565730 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } I0320 08:33:22.565778 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:22.565830 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0320 08:33:22.565880 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.565930 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.565992 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.566044 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.566131 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:22.566179 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0320 08:33:22.566226 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-5", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.566272 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.566346 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0320 08:33:22.566400 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:22.566446 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:22.566497 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:22.566547 32017 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0320 08:33:22.566599 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.566733 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0320 08:33:22.566817 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.566971 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.571105 32017 executor.go:111] Tasks: 99 done / 105 total; 5 can run I0320 08:33:22.571273 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.571377 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.571417 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.571479 32017 tags.go:163] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:22.571609 32017 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0320 08:33:22.571713 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0320 08:33:22.571759 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:22.571802 32017 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0320 08:33:22.571887 32017 executor.go:111] Tasks: 104 done / 105 total; 1 can run I0320 08:33:22.571964 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.572114 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0320 08:33:22.572200 32017 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0320 08:33:22.572257 32017 dns.go:157] Checking DNS records I0320 08:33:22.572277 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.572305 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.572356 32017 dns.go:219] Pre-creating DNS records I0320 08:33:22.572381 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.577102 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.579227 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.579317 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.579378 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.653691 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.758407 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.760467 32017 executor.go:111] Tasks: 0 done / 105 total; 45 can run I0320 08:33:22.760824 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0320 08:33:22.760949 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0320 08:33:22.760990 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0320 08:33:22.761040 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] }] } I0320 08:33:22.761170 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.761178 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:22.761352 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.761491 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:22.763056 32017 executor.go:111] Tasks: 45 done / 105 total; 26 can run I0320 08:33:22.763359 32017 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0320 08:33:22.763411 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0320 08:33:22.763289 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0320 08:33:22.763453 32017 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0320 08:33:22.763523 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0320 08:33:22.763695 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } W0320 08:33:22.763729 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:22.763749 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.763871 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion-elb.private-shared-ip.example.com"] } ] } I0320 08:33:22.764011 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:22.764066 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } W0320 08:33:22.764270 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/private-shared-ip.example.com" for IAM policy builder I0320 08:33:22.764227 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } W0320 08:33:22.764318 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/main" W0320 08:33:22.764337 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/private-shared-ip.example.com/backups/etcd/events" I0320 08:33:22.764403 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:22.764463 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.764599 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.764674 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.764797 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0320 08:33:22.764946 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.765022 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0320 08:33:22.765214 32017 executor.go:111] Tasks: 71 done / 105 total; 28 can run I0320 08:33:22.765307 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.765386 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.765531 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0320 08:33:22.765596 32017 api.go:53] PageSize not implemented I0320 08:33:22.765668 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.765738 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph","api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.765851 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.765816 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.765891 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0320 08:33:22.765975 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } W0320 08:33:22.766028 32017 api.go:53] PageSize not implemented I0320 08:33:22.766047 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph","api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.766121 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph"] } I0320 08:33:22.766153 32017 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "bastion-private-shared-ip-eepmph" } I0320 08:33:22.766137 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.766242 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.766335 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.766418 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.766503 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.766583 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.766669 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.766753 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.766835 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.766915 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:22.766997 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.767096 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.767207 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0320 08:33:22.767314 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.767416 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-5"] }] } I0320 08:33:22.767508 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.767595 32017 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0320 08:33:22.767672 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:22.767756 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.767864 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-3"] }] } I0320 08:33:22.767944 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:22.768016 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-4"] }] } I0320 08:33:22.768121 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.768251 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.14-debian-stretch-amd64-hvm-ebs-2019-08-16"] }], Owners: ["383156758163"] } I0320 08:33:22.772335 32017 executor.go:111] Tasks: 99 done / 105 total; 5 can run W0320 08:33:22.772457 32017 api.go:53] PageSize not implemented I0320 08:33:22.772490 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph","api-private-shared-ip-exa-ohatqj"] } W0320 08:33:22.772638 32017 api.go:53] PageSize not implemented I0320 08:33:22.772557 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.772813 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0320 08:33:22.772557 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0320 08:33:22.772930 32017 dnsname.go:122] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0320 08:33:22.772696 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph","api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.773079 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.773196 32017 executor.go:111] Tasks: 104 done / 105 total; 1 can run I0320 08:33:22.773267 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:22.773381 32017 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0320 08:33:22.775600 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:22.775658 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:22.775694 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:22.775725 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:22.775761 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:22.775793 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:22.775826 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:22.775861 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:22.775900 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:22.775935 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0320 08:33:22.775975 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0320 08:33:22.776010 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:22.776040 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:22.776069 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:22.776103 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:22.776133 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0320 08:33:22.776169 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:22.776202 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:22.776235 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0320 08:33:22.776269 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0320 08:33:22.776302 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-5"] }] } I0320 08:33:22.776335 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:22.776370 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:22.776400 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0320 08:33:22.776435 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:22.776466 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:22.776497 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:22.776531 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:22.776567 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:22.777504 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:22.777531 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:22.777571 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.777644 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0320 08:33:22.777721 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.777779 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.777820 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.777860 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.777903 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0320 08:33:22.777954 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.778008 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:22.778035 32017 natgateway.go:115] DescribeNatGateways: { } I0320 08:33:22.778077 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0320 08:33:22.778114 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0320 08:33:22.778154 32017 api.go:53] PageSize not implemented I0320 08:33:22.778171 32017 tags.go:31] DescribeTags { LoadBalancerNames: ["bastion-private-shared-ip-eepmph","api-private-shared-ip-exa-ohatqj"] } I0320 08:33:22.778223 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:22.778251 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:22.778270 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:22.778293 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:22.778311 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0320 08:33:22.778357 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.778381 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:22.778427 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:22.778461 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.778527 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:22.778578 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:22.778612 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0320 08:33:22.778649 32017 natgateway.go:115] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0320 08:33:22.778685 32017 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } autoscaling-group:nodes.private-shared-ip.example.com ok I0320 08:33:22.779394 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0320 08:33:22.779463 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } autoscaling-group:bastion.private-shared-ip.example.com ok I0320 08:33:22.779468 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } load-balancer:api-private-shared-ip-exa-ohatqj ok I0320 08:33:22.779556 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok iam-instance-profile:nodes.private-shared-ip.example.com ok I0320 08:33:22.779610 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0320 08:33:22.779705 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } iam-instance-profile:masters.private-shared-ip.example.com ok I0320 08:33:22.779690 32017 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "bastion-private-shared-ip-eepmph" } load-balancer:bastion-private-shared-ip-eepmph ok I0320 08:33:22.779489 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } I0320 08:33:22.779757 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } W0320 08:33:22.779823 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.779835 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } iam-instance-profile:bastions.private-shared-ip.example.com ok I0320 08:33:22.779844 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0320 08:33:22.779872 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0320 08:33:22.779889 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0320 08:33:22.779932 32017 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com autoscaling-config:lt-2 ok I0320 08:33:22.779948 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0320 08:33:22.779958 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0320 08:33:22.779979 32017 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0320 08:33:22.780011 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:22.779831 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } W0320 08:33:22.780119 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions route53-record:Z1AFAKE1ZON3YO/api.private-shared-ip.example.com ok I0320 08:33:22.780048 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0320 08:33:22.780145 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } I0320 08:33:22.780177 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com security-group:sg-4 ok autoscaling-config:lt-1 ok I0320 08:33:22.780192 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0320 08:33:22.780222 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0320 08:33:22.780219 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:22.780258 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0320 08:33:22.780345 32017 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0320 08:33:22.780295 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-5" }] }] } W0320 08:33:22.780395 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.780369 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0320 08:33:22.780413 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0320 08:33:22.780423 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0320 08:33:22.780446 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-3 ok I0320 08:33:22.780547 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0320 08:33:22.780626 32017 natgateway.go:181] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0320 08:33:22.780743 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:22.780804 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:22.780866 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0320 08:33:22.780963 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.780984 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0320 08:33:22.781015 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-5"] } I0320 08:33:22.781069 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-5", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:22.781138 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:22.781151 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-5" } security-group:sg-5 ok I0320 08:33:22.781187 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0320 08:33:22.781281 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:22.781337 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0320 08:33:22.781624 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecyclePrivateSharedIP (0.46s) === RUN TestLifecycleNodeTerminationHandlerQueueProcessor I0320 08:33:22.782132 32017 internetgateways.go:66] CreateInternetGateway: { } I0320 08:33:22.782203 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:33:22.782244 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:33:22.782293 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:33:22.782336 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:33:22.782367 32017 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:33:22.782397 32017 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:33:22.782430 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:33:22.782456 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:33:22.782509 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=true lifecycle_integration_test.go:184: running lifecycle test for cluster nthsqsresources.example.com I0320 08:33:22.796325 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.20.6 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.20.6 ********************************************************************************* I0320 08:33:22.798708 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:22.798813 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:22.875473 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:22.992210 32017 iamrole.go:90] ListRoles: { } I0320 08:33:22.999186 32017 executor.go:111] Tasks: 0 done / 89 total; 48 can run I0320 08:33:22.999526 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-events" I0320 08:33:22.999477 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:22.999657 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-main" I0320 08:33:22.999703 32017 keypair.go:195] Issuing new certificate: "etcd-peers-ca-main" I0320 08:33:22.999693 32017 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] }] } I0320 08:33:22.999802 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0320 08:33:22.999843 32017 vpcs.go:186] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0320 08:33:22.999689 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "masters.nthsqsresources.example.com", Tags: [{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" },{ Key: "Name", Value: "masters.nthsqsresources.example.com" }] } I0320 08:33:22.999998 32017 keypair.go:195] Issuing new certificate: "etcd-clients-ca" I0320 08:33:22.999954 32017 iamrole.go:55] CreateRole: { AssumeRolePolicyDocument: "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": { \"Service\": \"ec2.amazonaws.com\"},\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}", RoleName: "nodes.nthsqsresources.example.com", Tags: [{ Key: "Name", Value: "nodes.nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] } I0320 08:33:22.999819 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:22.999878 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } W0320 08:33:23.000151 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:23.000229 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:23.000301 32017 vfs_castore.go:612] CA private key was not found I0320 08:33:23.000333 32017 keypair.go:195] Issuing new certificate: "ca" I0320 08:33:23.000245 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "nodes.nthsqsresources.example.com", Tags: [{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.nthsqsresources.example.com" }] } I0320 08:33:23.000359 32017 keypair.go:195] Issuing new certificate: "apiserver-aggregator-ca" I0320 08:33:23.000293 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.000421 32017 keypair.go:195] Issuing new certificate: "etcd-manager-ca-events" I0320 08:33:23.000472 32017 keypair.go:195] Issuing new certificate: "service-account" I0320 08:33:23.000498 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:23.000489 32017 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "masters.nthsqsresources.example.com", Tags: [{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" },{ Key: "Name", Value: "masters.nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" }] } I0320 08:33:23.000569 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:23.000701 32017 keypairs.go:46] ImportKeyPair: { KeyName: "kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 213, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] }] } I0320 08:33:23.000831 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.nthsqsresources.example.com"] }] } I0320 08:33:23.000968 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-main.nthsqsresources.example.com" }, { Key: "KubernetesCluster", Value: "nthsqsresources.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:23.001069 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:23.001107 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.001225 32017 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.nthsqsresources.example.com" }, { Key: "KubernetesCluster", Value: "nthsqsresources.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0320 08:33:23.001307 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:23.001340 32017 dhcpoptions.go:122] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] }] } I0320 08:33:23.001408 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:23.023392 32017 executor.go:111] Tasks: 48 done / 89 total; 21 can run W0320 08:33:23.023609 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder I0320 08:33:23.023545 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.nthsqsresources.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.nthsqsresources.example.com"] } ] } W0320 08:33:23.023665 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:23.023687 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" W0320 08:33:23.023711 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder I0320 08:33:23.023839 32017 iamrole.go:161] ListAttachedRolePolicies: masters.nthsqsresources.example.com I0320 08:33:23.023926 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.nthsqsresources.example.com I0320 08:33:23.023755 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }, { Name: "tag:Name", Values: ["nodes.nthsqsresources.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.nthsqsresources.example.com"] } ] } I0320 08:33:23.023971 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "masters.nthsqsresources.example.com", RoleName: "masters.nthsqsresources.example.com" } W0320 08:33:23.023951 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder I0320 08:33:23.023986 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.024124 32017 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.nthsqsresources.example.com", RoleName: "nodes.nthsqsresources.example.com" } I0320 08:33:23.024262 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.nthsqsresources.example.com", RoleName: "nodes.nthsqsresources.example.com" } I0320 08:33:23.024231 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.nthsqsresources.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" },{ Key: "Name", Value: "masters.nthsqsresources.example.com" }] }], VpcId: "vpc-1" } I0320 08:33:23.024244 32017 subnets.go:93] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "nthsqsresources.example.com" }, { Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.nthsqsresources.example.com" } ] }], VpcId: "vpc-1" } I0320 08:33:23.024388 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:23.024453 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } W0320 08:33:23.024667 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder I0320 08:33:23.024677 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:23.024773 32017 dhcpoptions.go:90] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } W0320 08:33:23.024714 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:23.024832 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" I0320 08:33:23.024831 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.025038 32017 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.nthsqsresources.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.nthsqsresources.example.com" },{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0320 08:33:23.025151 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:23.025200 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:23.025237 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0320 08:33:23.025270 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.025361 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/nthsqsresources.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0320 08:33:23.025470 32017 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "nthsqsresources.example.com" },{ Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" },{ Key: "Name", Value: "nthsqsresources.example.com" }] }] } I0320 08:33:23.025534 32017 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "nthsqsresources.example.com" }, { Key: "KubernetesCluster", Value: "nthsqsresources.example.com" }, { Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0320 08:33:23.025585 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:23.025654 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:23.025707 32017 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "nthsqsresources.example.com" }, { Key: "KubernetesCluster", Value: "nthsqsresources.example.com" }, { Key: "kubernetes.io/cluster/nthsqsresources.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0320 08:33:23.025512 32017 iamrolepolicy.go:69] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeVolumes\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateTags\",\n \"ec2:CreateVolume\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:CreateRoute\",\n \"ec2:DeleteRoute\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:RevokeSecurityGroupIngress\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"ec2:ResourceTag/KubernetesCluster\": \"nthsqsresources.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:CompleteLifecycleAction\",\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"nthsqsresources.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeLifecycleHooks\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"autoscaling:DescribeAutoScalingInstances\",\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeLaunchTemplateVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"autoscaling:UpdateAutoScalingGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"nthsqsresources.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"autoscaling:ResourceTag/KubernetesCluster\": \"nthsqsresources.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateTargetGroup\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"iam:ListServerCertificates\",\n \"iam:GetServerCertificate\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.nthsqsresources.example.com", RoleName: "masters.nthsqsresources.example.com" } I0320 08:33:23.025876 32017 executor.go:111] Tasks: 69 done / 89 total; 16 can run I0320 08:33:23.025975 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.026065 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.026274 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:23.026364 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:23.026501 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0320 08:33:23.026562 32017 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0320 08:33:23.026610 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:23.026777 32017 routetable.go:148] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0320 08:33:23.026851 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.026995 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:23.027096 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.027261 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:23.027342 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.027445 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.027570 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.027660 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.027784 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.027877 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.027956 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:23.028030 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:23.028135 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.028265 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.028402 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:23.028521 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:23.028633 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0320 08:33:23.028736 32017 securitygroups.go:232] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }] } I0320 08:33:23.028891 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0320 08:33:23.028988 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.029133 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.029250 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.029457 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0320 08:33:23.029530 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.029578 32017 securitygroups.go:285] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } I0320 08:33:23.033345 32017 executor.go:111] Tasks: 85 done / 89 total; 2 can run I0320 08:33:23.033712 32017 executor.go:111] Tasks: 87 done / 89 total; 2 can run I0320 08:33:23.033940 32017 executor.go:111] Tasks: 89 done / 89 total; 0 can run I0320 08:33:23.033996 32017 dns.go:157] Checking DNS records I0320 08:33:23.034015 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:23.034050 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:23.034102 32017 dns.go:219] Pre-creating DNS records I0320 08:33:23.034128 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:23.039070 32017 zones.go:91] ListHostedZonesPages { } ********************************************************************************* A new kubernetes version is available: 1.20.6 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.20.6 ********************************************************************************* I0320 08:33:23.041172 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.041258 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.114317 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:23.235200 32017 iamrole.go:90] ListRoles: { } I0320 08:33:23.236739 32017 executor.go:111] Tasks: 0 done / 89 total; 48 can run I0320 08:33:23.237059 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.237274 32017 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0320 08:33:23.237444 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.237592 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.237692 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:33:23.237729 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:23.237832 32017 keypairs.go:88] DescribeKeyPairs: { KeyNames: ["kubernetes.nthsqsresources.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0320 08:33:23.238028 32017 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:33:23.238100 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:23.238139 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.239017 32017 executor.go:111] Tasks: 48 done / 89 total; 21 can run I0320 08:33:23.239139 32017 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:33:23.239332 32017 iamrole.go:161] ListAttachedRolePolicies: masters.nthsqsresources.example.com I0320 08:33:23.239405 32017 iamrole.go:161] ListAttachedRolePolicies: nodes.nthsqsresources.example.com I0320 08:33:23.239264 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } W0320 08:33:23.239576 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder I0320 08:33:23.239526 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.239685 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["nthsqsresources.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.239805 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.nthsqsresources.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.nthsqsresources.example.com"] } ] } I0320 08:33:23.239950 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:23.240004 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }, { Name: "tag:Name", Values: ["masters.nthsqsresources.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.nthsqsresources.example.com"] } ] } I0320 08:33:23.240185 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } W0320 08:33:23.240220 32017 iam_builder.go:513] ignoring memfs path "memfs://clusters.example.com/nthsqsresources.example.com" for IAM policy builder W0320 08:33:23.240268 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/main" W0320 08:33:23.240290 32017 iam_builder.go:549] unknown writeable path, can't apply IAM policy: "memfs://clusters.example.com/nthsqsresources.example.com/backups/etcd/events" I0320 08:33:23.240951 32017 executor.go:111] Tasks: 69 done / 89 total; 16 can run I0320 08:33:23.241057 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.241152 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.241233 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:23.241327 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.241514 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.241658 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.241889 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242036 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242156 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242250 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242332 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242415 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.242500 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.242583 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-1"] }] } I0320 08:33:23.242666 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.242749 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "group-id", Values: ["sg-2"] }] } I0320 08:33:23.242831 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:23.242918 32017 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: ["k8s-1.4-debian-jessie-amd64-hvm-ebs-2016-10-21"] }], Owners: ["383156758163"] } I0320 08:33:23.245792 32017 executor.go:111] Tasks: 85 done / 89 total; 2 can run I0320 08:33:23.246297 32017 executor.go:111] Tasks: 87 done / 89 total; 2 can run I0320 08:33:23.246533 32017 executor.go:111] Tasks: 89 done / 89 total; 0 can run I0320 08:33:23.251555 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-11400000"] }] } I0320 08:33:23.251625 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0320 08:33:23.251661 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-15000000"] }] } I0320 08:33:23.251696 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0320 08:33:23.251736 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0320 08:33:23.251772 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0320 08:33:23.251805 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0320 08:33:23.251836 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0320 08:33:23.251869 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0320 08:33:23.251905 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0320 08:33:23.251943 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0320 08:33:23.251987 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0320 08:33:23.252017 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0320 08:33:23.252047 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0320 08:33:23.252080 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0320 08:33:23.252139 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:33:23.252174 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0320 08:33:23.252206 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:33:23.252244 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0320 08:33:23.252274 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0320 08:33:23.252304 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0320 08:33:23.252333 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0320 08:33:23.252367 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0320 08:33:23.252401 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:33:23.252433 32017 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } W0320 08:33:23.253296 32017 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0320 08:33:23.253322 32017 keypairs.go:88] DescribeKeyPairs: { } I0320 08:33:23.253359 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253411 32017 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/nthsqsresources.example.com"] }] } I0320 08:33:23.253465 32017 volumes.go:117] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253521 32017 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253567 32017 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253617 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253655 32017 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/nthsqsresources.example.com"] }] } I0320 08:33:23.253697 32017 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253745 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["nthsqsresources.example.com"] }] } I0320 08:33:23.253781 32017 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/nthsqsresources.example.com"] }] } W0320 08:33:23.253825 32017 api.go:53] PageSize not implemented I0320 08:33:23.253845 32017 loadbalancers.go:31] DescribeLoadBalancers v2 { PageSize: 20 } W0320 08:33:23.253873 32017 loadbalancers.go:34] PageSize not implemented I0320 08:33:23.253891 32017 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0320 08:33:23.253913 32017 targetgroups.go:35] PageSize not implemented I0320 08:33:23.253932 32017 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0320 08:33:23.253983 32017 zones.go:91] ListHostedZonesPages { } I0320 08:33:23.254009 32017 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:23.254058 32017 iaminstanceprofile.go:158] ListInstanceProfiles: { } I0320 08:33:23.254091 32017 iamrole.go:90] ListRoles: { } I0320 08:33:23.254134 32017 internetgateways.go:101] DescribeInternetGateways: { } I0320 08:33:23.254175 32017 routetable.go:53] DescribeRouteTables: { } I0320 08:33:23.254209 32017 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0320 08:33:23.254677 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.nthsqsresources.example.com", RoleName: "masters.nthsqsresources.example.com" } I0320 08:33:23.254679 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-2" } I0320 08:33:23.254742 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "masters.nthsqsresources.example.com" } autoscaling-group:nodes.nthsqsresources.example.com ok I0320 08:33:23.254768 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-1"] } volume:vol-2 ok I0320 08:33:23.254886 32017 iaminstanceprofile.go:122] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.nthsqsresources.example.com", RoleName: "nodes.nthsqsresources.example.com" } I0320 08:33:23.254972 32017 iaminstanceprofile.go:206] DeleteInstanceProfile: { InstanceProfileName: "nodes.nthsqsresources.example.com" } I0320 08:33:23.254842 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0320 08:33:23.255039 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:23.255062 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } iam-instance-profile:masters.nthsqsresources.example.com ok I0320 08:33:23.255023 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "masters.nthsqsresources.example.com" } I0320 08:33:23.255113 32017 iamrole.go:180] ListAttachedRolePolicies: masters.nthsqsresources.example.com I0320 08:33:23.255101 32017 securitygroups.go:110] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0320 08:33:23.255135 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "masters.nthsqsresources.example.com", RoleName: "masters.nthsqsresources.example.com" } I0320 08:33:23.255172 32017 iamrole.go:137] DeleteRole: { RoleName: "masters.nthsqsresources.example.com" } iam-role:masters.nthsqsresources.example.com ok autoscaling-group:master-us-test-1a.masters.nthsqsresources.example.com ok I0320 08:33:23.255154 32017 securitygroups.go:198] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0320 08:33:23.255283 32017 securitygroups.go:216] RevokeSecurityGroupIngress not implemented - does not actually revoke permissions I0320 08:33:23.255303 32017 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } I0320 08:33:23.255280 32017 iamrolepolicy.go:104] ListRolePolicies: { RoleName: "nodes.nthsqsresources.example.com" } security-group:sg-2 ok I0320 08:33:23.255337 32017 iamrole.go:180] ListAttachedRolePolicies: nodes.nthsqsresources.example.com iam-instance-profile:nodes.nthsqsresources.example.com ok I0320 08:33:23.255147 32017 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.nthsqsresources.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0320 08:33:23.255340 32017 volumes.go:191] DeleteVolume: { VolumeId: "vol-1" } security-group:sg-1 ok I0320 08:33:23.255352 32017 iamrolepolicy.go:152] DeleteRolePolicy: { PolicyName: "nodes.nthsqsresources.example.com", RoleName: "nodes.nthsqsresources.example.com" } volume:vol-1 ok route53-record:Z1AFAKE1ZON3YO/api.nthsqsresources.example.com. ok I0320 08:33:23.255388 32017 iamrole.go:137] DeleteRole: { RoleName: "nodes.nthsqsresources.example.com" } autoscaling-config:lt-1 ok I0320 08:33:23.255389 32017 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } iam-role:nodes.nthsqsresources.example.com ok I0320 08:33:23.255486 32017 internetgateways.go:226] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0320 08:33:23.255527 32017 keypairs.go:147] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok I0320 08:33:23.255646 32017 subnets.go:219] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0320 08:33:23.255734 32017 routetable.go:185] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0320 08:33:23.255817 32017 vpcs.go:216] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0320 08:33:23.255894 32017 dhcpoptions.go:168] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok I0320 08:33:23.256188 32017 featureflag.go:165] FeatureFlag "SpecOverrideFlag"=false --- PASS: TestLifecycleNodeTerminationHandlerQueueProcessor (0.47s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 38.249s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.087s ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0320 08:32:23.993361 26593 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.051s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.025s === RUN TestPodController I0320 08:32:28.408292 28433 pod.go:60] starting pod controller I0320 08:32:28.408473 28433 stoppable.go:62] shutting down controller I0320 08:32:28.408537 28433 pod.go:108] Got stop signal --- PASS: TestPodController (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/watchers 0.049s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.045s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000a3a50} route53_test.go:93: Got zone list: [0xc0000a3a80] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc000010090} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000a3b50} route53_test.go:93: Got zone list: [0xc0000a3b80] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000100a0} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc0000a3c20} route53_test.go:174: Successfully added managed DNS zone: &{0xc000227aa0 0xc0000100b8} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000a3d80} route53_test.go:93: Got zone list: [0xc0000a3db0] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000100d0} route53_test.go:121: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000a3eb0} route53_test.go:93: Got zone list: [0xc0000a3ee0] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000100f0} route53_test.go:191: Successfully added resource record set: {0xc000130100 0xc000010110} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025a160} route53_test.go:93: Got zone list: [0xc00025a190] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc000010198} route53_test.go:203: Successfully added resource record set: {0xc000130280 0xc0000101b8} route53_test.go:121: Got 1 recordsets: [0xc00025a330] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025a460} route53_test.go:93: Got zone list: [0xc00025a490] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc000010250} route53_test.go:225: Successfully added resource record set: {0xc000130400 0xc000010270} route53_test.go:232: Correctly failed to add duplicate resource record {0xc000130400 0xc000010270}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025a7f0} route53_test.go:93: Got zone list: [0xc00025a820] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc000010328} route53_test.go:250: Successfully removed resource set {0xc000130600 0xc000010348} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025aaa0} route53_test.go:93: Got zone list: [0xc00025aad0] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000103d0} route53_test.go:268: Successfully removed resource set {0xc000130780 0xc0000103f0} after adding route53_test.go:121: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025ad80} route53_test.go:93: Got zone list: [0xc00025adb0] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc000010480} commontests.go:196: Successfully added resource record set: {0xc000130900 0xc0000104a0} commontests.go:45: Correctly replaced resource record {0xc000130900 0xc0000104a0} -> {0xc000130a00 0xc0000104f0} commontests.go:145: Got 1 recordsets: [0xc00025b0c0] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025b290} route53_test.go:93: Got zone list: [0xc00025b2c0] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000105a0} commontests.go:196: Successfully added resource record set: {0xc000130c80 0xc0000105c0} commontests.go:70: Correctly replaced resource record {0xc000130c80 0xc0000105c0} -> {0xc000130d80 0xc000010610} commontests.go:145: Got 1 recordsets: [0xc00025b5d0] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025b7f0} route53_test.go:93: Got zone list: [0xc00025b820] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000106d0} commontests.go:196: Successfully added resource record set: {0xc000131000 0xc0000106f0} commontests.go:145: Got 2 recordsets: [0xc00025ba90 0xc00025bab0] commontests.go:145: Got 2 recordsets: [0xc00025bb20 0xc00025bb40] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00025bce0} route53_test.go:93: Got zone list: [0xc00025bd10] route53_test.go:98: Got at least 1 zone in list:&{0xc0002278c0 0xc0000107f0} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.021s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e6ca0} clouddns_test.go:71: Got zone list: [0xc00059ae40] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059ae10} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e6da0} clouddns_test.go:71: Got zone list: [0xc00059aee8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059aeb8} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:135: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e6ea0} clouddns_test.go:137: Got zones, making new Zone clouddns_test.go:153: Successfully added managed DNS zone: &{0xc0002eed40 0xc00059af90} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e6f60} clouddns_test.go:71: Got zone list: [0xc00059b038] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b008} clouddns_test.go:99: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7080} clouddns_test.go:71: Got zone list: [0xc00059b158] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b128} clouddns_test.go:169: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e71c0} clouddns_test.go:71: Got zone list: [0xc00059b2a8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b278} clouddns_test.go:180: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:99: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7320} clouddns_test.go:71: Got zone list: [0xc00059b4a0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b470} clouddns_test.go:202: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:209: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7480} clouddns_test.go:71: Got zone list: [0xc00059b620] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b5f0} clouddns_test.go:227: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e75c0} clouddns_test.go:71: Got zone list: [0xc00059b770] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b740} clouddns_test.go:245: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:99: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7720} clouddns_test.go:71: Got zone list: [0xc00059b920] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059b8f0} commontests.go:196: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:145: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7880} clouddns_test.go:71: Got zone list: [0xc00059bbd8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059bba8} commontests.go:196: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:145: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7a00} clouddns_test.go:71: Got zone list: [0xc00059bef0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00059bec0} commontests.go:196: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:145: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:145: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000591268 0xc0002e7be0} clouddns_test.go:71: Got zone list: [0xc00045c570] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0002eec00 0xc00045c510} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.093s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.045s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.167s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.02s) === RUN TestContainerdBuilder_Docker_19_03_14 --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.00s) === RUN TestContainerdBuilder_Simple I0320 08:32:40.733435 31771 assetstore.go:106] Matching assets for "^(\\./)?usr/local/(bin/containerd|bin/crictl|bin/ctr|sbin/runc)": I0320 08:32:40.733480 31771 assetstore.go:109] usr/local/bin/containerd I0320 08:32:40.733494 31771 assetstore.go:109] usr/local/bin/containerd-shim I0320 08:32:40.733508 31771 assetstore.go:109] usr/local/bin/containerd-shim-runc-v1 I0320 08:32:40.733519 31771 assetstore.go:109] usr/local/bin/containerd-shim-runc-v2 I0320 08:32:40.733542 31771 assetstore.go:109] usr/local/bin/crictl I0320 08:32:40.733557 31771 assetstore.go:109] usr/local/bin/ctr I0320 08:32:40.733568 31771 assetstore.go:109] usr/local/sbin/runc --- PASS: TestContainerdBuilder_Simple (0.00s) === RUN TestContainerdBuilder_Flatcar I0320 08:32:40.738358 31771 containerd.go:56] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0320 08:32:40.740099 31771 docker.go:61] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestDockerBuilder_Simple I0320 08:32:40.741071 31771 assetstore.go:106] Matching assets for "^docker/": I0320 08:32:40.741092 31771 assetstore.go:109] docker/docker I0320 08:32:40.741104 31771 assetstore.go:109] docker/docker-containerd I0320 08:32:40.741115 31771 assetstore.go:109] docker/docker-containerd-ctr I0320 08:32:40.741125 31771 assetstore.go:109] docker/docker-containerd-shim I0320 08:32:40.741134 31771 assetstore.go:109] docker/docker-init I0320 08:32:40.741144 31771 assetstore.go:109] docker/docker-proxy I0320 08:32:40.741155 31771 assetstore.go:109] docker/docker-runc I0320 08:32:40.741165 31771 assetstore.go:109] docker/dockerd --- PASS: TestDockerBuilder_Simple (0.01s) === RUN TestDockerBuilder_18_06_3 I0320 08:32:40.748334 31771 assetstore.go:106] Matching assets for "^docker/": I0320 08:32:40.748368 31771 assetstore.go:109] docker/docker I0320 08:32:40.748376 31771 assetstore.go:109] docker/docker-containerd I0320 08:32:40.748382 31771 assetstore.go:109] docker/docker-containerd-ctr I0320 08:32:40.748387 31771 assetstore.go:109] docker/docker-containerd-shim I0320 08:32:40.748393 31771 assetstore.go:109] docker/docker-init I0320 08:32:40.748398 31771 assetstore.go:109] docker/docker-proxy I0320 08:32:40.748403 31771 assetstore.go:109] docker/docker-runc I0320 08:32:40.748407 31771 assetstore.go:109] docker/dockerd --- PASS: TestDockerBuilder_18_06_3 (0.00s) === RUN TestDockerBuilder_19_03_11 I0320 08:32:40.751108 31771 assetstore.go:106] Matching assets for "^docker/": I0320 08:32:40.751120 31771 assetstore.go:109] docker/containerd I0320 08:32:40.751127 31771 assetstore.go:109] docker/containerd-shim I0320 08:32:40.751132 31771 assetstore.go:109] docker/ctr I0320 08:32:40.751137 31771 assetstore.go:109] docker/docker I0320 08:32:40.751142 31771 assetstore.go:109] docker/docker-init I0320 08:32:40.751146 31771 assetstore.go:109] docker/docker-proxy I0320 08:32:40.751151 31771 assetstore.go:109] docker/dockerd I0320 08:32:40.751155 31771 assetstore.go:109] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.00s) === RUN TestDockerBuilder_LogFlags I0320 08:32:40.753619 31771 assetstore.go:106] Matching assets for "^docker/": I0320 08:32:40.753634 31771 assetstore.go:109] docker/docker I0320 08:32:40.753641 31771 assetstore.go:109] docker/docker-containerd I0320 08:32:40.753646 31771 assetstore.go:109] docker/docker-containerd-ctr I0320 08:32:40.753651 31771 assetstore.go:109] docker/docker-containerd-shim I0320 08:32:40.753656 31771 assetstore.go:109] docker/docker-init I0320 08:32:40.753661 31771 assetstore.go:109] docker/docker-proxy I0320 08:32:40.753666 31771 assetstore.go:109] docker/docker-runc I0320 08:32:40.753671 31771 assetstore.go:109] docker/dockerd --- PASS: TestDockerBuilder_LogFlags (0.00s) === RUN TestDockerBuilder_SkipInstall I0320 08:32:40.756329 31771 docker.go:61] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0320 08:32:40.756724 31771 assetstore.go:106] Matching assets for "^docker/": I0320 08:32:40.756736 31771 assetstore.go:109] docker/docker I0320 08:32:40.756742 31771 assetstore.go:109] docker/docker-containerd I0320 08:32:40.756747 31771 assetstore.go:109] docker/docker-containerd-ctr I0320 08:32:40.756753 31771 assetstore.go:109] docker/docker-containerd-shim I0320 08:32:40.756758 31771 assetstore.go:109] docker/docker-init I0320 08:32:40.756763 31771 assetstore.go:109] docker/docker-proxy I0320 08:32:40.756767 31771 assetstore.go:109] docker/docker-runc I0320 08:32:40.756772 31771 assetstore.go:109] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.00s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0320 08:32:40.759469 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.759527 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.759556 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.759594 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.759623 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.759636 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.759653 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.759675 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.759688 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.765905 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.01s) === RUN TestDockerHooksBuilder I0320 08:32:40.767086 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.767114 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.767133 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.767152 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.767167 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.767178 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.767190 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.767202 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.767213 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.768242 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0320 08:32:40.769314 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.769340 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.769356 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.769373 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.769387 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.769399 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.769411 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.769423 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.769431 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.770383 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0320 08:32:40.773843 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.773870 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.773887 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.773906 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.773921 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.773933 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.773945 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.773956 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.773966 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.775161 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.02s) === RUN TestAwsIamAuthenticator I0320 08:32:40.790799 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.790865 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.790892 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.790922 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.790946 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.790970 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.790986 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.791006 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.791041 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.792667 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0320 08:32:40.798653 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.798705 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:40.798731 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:40.798780 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:40.798815 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:40.798832 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:40.798851 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:40.798872 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:40.798887 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:40.800470 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.44s) === RUN TestKubeAPIServerBuilderARM64 I0320 08:32:42.241168 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.241219 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.241246 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.241273 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.241298 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.241313 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.241378 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.241398 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.241412 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.244452 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (0.10s) === RUN TestKubeControllerManagerBuilder I0320 08:32:42.341014 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.341089 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.341139 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.341195 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.341238 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.341267 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.341298 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.341330 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.341355 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.343700 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0320 08:32:42.350089 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.350149 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.350183 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.350224 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.350263 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.350290 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.350321 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.350351 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.350374 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.352998 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (0.10s) === RUN TestKubeControllerManagerBuilderARM64 I0320 08:32:42.447896 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.447981 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.448029 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.448077 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.448119 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.448148 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.448180 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.448213 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.448241 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.450677 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (0.10s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.10 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.10 (0.00s) === RUN TestKubeProxyBuilder I0320 08:32:42.545498 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.545551 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.545579 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.545612 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.545638 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.545653 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.545671 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.545691 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.545708 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.547210 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.00s) === RUN TestKubeProxyBuilderAMD64 I0320 08:32:42.550090 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.550127 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.550149 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.550172 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.550192 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.550208 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.550225 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.550242 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.550256 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.551656 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (0.09s) === RUN TestKubeProxyBuilderARM64 I0320 08:32:42.642769 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.642826 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.642855 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.642884 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.642908 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.642922 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.642939 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.642957 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.642971 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.644800 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (0.09s) === RUN TestKubeProxyBuilderWarmPool I0320 08:32:42.736284 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.736339 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.736367 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.736397 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.736422 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.736439 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.736456 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.736476 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.736491 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.737971 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderWarmPool (0.01s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0320 08:32:42.744002 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.744050 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.744076 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.744106 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.744130 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.744146 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.744163 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.744181 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.744195 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.745727 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeSchedulerBuilder (0.00s) === RUN TestKubeSchedulerBuilderAMD64 I0320 08:32:42.748930 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.748971 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.748995 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.749022 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.749045 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.749061 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.749077 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.749094 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.749108 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.750531 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeSchedulerBuilderAMD64 (0.09s) === RUN TestKubeSchedulerBuilderARM64 I0320 08:32:42.842223 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.842283 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.842311 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.842343 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.842368 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.842384 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.842402 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.842425 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.842441 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.843970 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestKubeSchedulerBuilderARM64 (0.09s) === RUN TestKubectlBuilder I0320 08:32:42.934836 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.934922 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.934973 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.935024 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.935069 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.935106 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.935138 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.935169 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.935193 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.936886 31771 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.937980 31771 assetstore.go:157] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.00s) === RUN Test_InstanceGroupKubeletMerge --- PASS: Test_InstanceGroupKubeletMerge (0.00s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder --- PASS: Test_RunKubeletBuilder (0.00s) === RUN Test_RunKubeletBuilderWarmPool --- PASS: Test_RunKubeletBuilderWarmPool (0.00s) === RUN TestProtokubeBuilder I0320 08:32:42.943804 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.943853 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.943882 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.943913 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.943937 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.943954 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.943970 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.943988 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.944003 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.945413 31771 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.946456 31771 assetstore.go:106] Matching assets for "protokube$": I0320 08:32:42.946473 31771 assetstore.go:109] /opt/kops/bin/protokube I0320 08:32:42.946483 31771 assetstore.go:127] Found single matching asset for expr "protokube$": "protokube" I0320 08:32:42.946503 31771 assetstore.go:106] Matching assets for "channels$": I0320 08:32:42.946511 31771 assetstore.go:109] /opt/kops/bin/channels I0320 08:32:42.946518 31771 assetstore.go:127] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.00s) === RUN TestSecretBuilder I0320 08:32:42.948079 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.948115 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.948143 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.948179 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.948209 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.948232 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.948259 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.948283 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.948301 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.949886 31771 zones.go:91] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.00s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0320 08:32:42.952544 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.952579 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.952598 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.952623 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.952643 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.952658 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.952672 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.952687 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.952701 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.954029 31771 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.954985 31771 update_service.go:95] Detected OS {deb ubuntu focal %!s(float32=20.04)}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.00s) === RUN TestUpdateServiceBuilderExternal I0320 08:32:42.955441 31771 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.955476 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.955496 31771 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.955518 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.955538 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.955555 31771 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.955571 31771 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.955585 31771 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.955599 31771 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.956901 31771 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.957802 31771 update_service.go:90] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.00s) PASS ok k8s.io/kops/nodeup/pkg/model 2.302s === RUN TestCiliumBuilder --- PASS: TestCiliumBuilder (0.00s) PASS ok k8s.io/kops/nodeup/pkg/model/networking 0.060s ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] === RUN Test_Strategy --- PASS: Test_Strategy (0.04s) === RUN Test_In_StateStore --- PASS: Test_In_StateStore (0.00s) PASS ok k8s.io/kops/pkg/acls/s3 0.085s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN TestWeaveParseConfigYAML === RUN TestWeaveParseConfigYAML/"networking:_{__weave:_{_memoryRequest:_500Mi,_cpuRequest:_100m,_npcMemoryRequest:_100Mi,_npcCPURequest:_50m}_}" === RUN TestWeaveParseConfigYAML/"networking:_{}" --- PASS: TestWeaveParseConfigYAML (0.00s) --- PASS: TestWeaveParseConfigYAML/"networking:_{__weave:_{_memoryRequest:_500Mi,_cpuRequest:_100m,_npcMemoryRequest:_100Mi,_npcCPURequest:_50m}_}" (0.00s) --- PASS: TestWeaveParseConfigYAML/"networking:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.057s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.079s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.050s ? k8s.io/kops/pkg/apis/kops/registry [no test files] === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/kubernetes-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0320 08:32:25.762126 27555 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0320 08:32:25.762291 27555 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/kubernetes-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.028s ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0320 08:32:35.172865 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.172974 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173017 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173048 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173079 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0320 08:32:35.173250 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173319 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173342 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173364 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173391 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173415 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173440 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173462 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173490 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173517 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173544 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } I0320 08:32:35.173574 30230 images.go:49] DescribeImages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0320 08:32:35.173723 30230 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0320 08:32:35.173775 30230 images.go:49] DescribeImages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_ValidateTopology --- PASS: Test_ValidateTopology (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/unknown_Calico_encapsulation_mode === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_encapsulation_mode (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.081s ? k8s.io/kops/pkg/apis/nodeup [no test files] === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) PASS ok k8s.io/kops/pkg/assets 0.098s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.077s ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.084s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.060s ? k8s.io/kops/pkg/clusteraddons [no test files] === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.01s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.151s ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/commands/helpers [no test files] === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.061s ? k8s.io/kops/pkg/configserver [no test files] === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.021s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.048s ? k8s.io/kops/pkg/dump [no test files] === RUN TestHasExtraFields --- PASS: TestHasExtraFields (0.02s) PASS ok k8s.io/kops/pkg/edit 0.100s === RUN TestFlagToFalse I0320 08:32:25.672487 27519 featureflag_test.go:33] Created flag Unittest1 I0320 08:32:25.672542 27519 featureflag.go:165] FeatureFlag "UnitTest1"=false I0320 08:32:25.672558 27519 featureflag.go:165] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0320 08:32:25.672632 27519 featureflag.go:165] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.049s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.01s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.050s === RUN TestRenderInstanceGroupZones W0320 08:32:27.910304 28215 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.116s === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:102: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0320 08:32:52.565498 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.565539 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.566619 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.566632 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.571907 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.571974 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.572027 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.572035 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.573552 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.574276 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.574307 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.574350 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.575622 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.575682 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.581014 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.581054 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.581713 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.581738 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.581757 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.582989 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.583029 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.588174 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.588220 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.588230 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.588237 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.589264 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.590024 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.590055 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.590076 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.591264 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.591280 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.596490 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.596520 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.597024 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.597043 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.597056 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.598221 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.598248 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.603424 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.603460 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.604070 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.604093 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.604109 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.605277 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.605303 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.610519 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.610540 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.610554 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.610563 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:52.611265 32073 instancegroups.go:398] Draining the node: "node-2a.local". I0320 08:32:52.611852 32073 instancegroups.go:417] deleting node "node-2a.local" from kubernetes I0320 08:32:52.611874 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.611890 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.613039 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.613061 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.618245 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.618276 32073 instancegroups.go:398] Draining the node: "node-2b.local". I0320 08:32:52.618822 32073 instancegroups.go:417] deleting node "node-2b.local" from kubernetes I0320 08:32:52.618841 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.618856 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.619995 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.620016 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.625145 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.625227 32073 instancegroups.go:398] Draining the node: "node-2c.local". I0320 08:32:52.626307 32073 instancegroups.go:417] deleting node "node-2c.local" from kubernetes I0320 08:32:52.626345 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.626371 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.627574 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.627604 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.632834 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.632871 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0320 08:32:52.633763 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.633809 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.634975 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.635059 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.635128 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.635152 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.635194 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.636344 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.636411 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.636430 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.636467 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.637611 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.637651 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.637713 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.637734 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.637768 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.638926 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.638997 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.639019 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.639057 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.640209 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.640273 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.640292 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.640328 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.641478 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.641502 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.641560 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.641579 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.641608 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.642747 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.642813 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.642832 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.642863 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.644041 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. W0320 08:32:52.644099 32073 instancegroups.go:393] Not draining cluster nodes as 'cloudonly' flag is set. I0320 08:32:52.644113 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.644136 32073 instancegroups.go:435] waiting for 1ms after terminating instance W0320 08:32:52.645342 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. I0320 08:32:52.645391 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0320 08:32:52.645866 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.645905 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.647137 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.647175 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.647195 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.647248 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.647276 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.647290 32073 instancegroups.go:479] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.647304 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.648047 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.648816 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.648843 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.648865 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.650076 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.650128 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.650151 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.650205 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.651278 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.651316 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.651341 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.652546 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.652586 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.652608 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.652630 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.652649 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.652663 32073 instancegroups.go:479] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.652676 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.653766 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.654563 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.654593 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.654616 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.655808 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.655860 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.655882 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.655931 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.656857 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.656891 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.656916 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.658121 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.658161 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.658183 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.658224 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.659116 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.659150 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.659173 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.660379 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.660416 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.660440 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.660455 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.660473 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.660492 32073 instancegroups.go:479] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.660513 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:52.661531 32073 instancegroups.go:398] Draining the node: "node-2a.local". I0320 08:32:52.662393 32073 instancegroups.go:417] deleting node "node-2a.local" from kubernetes I0320 08:32:52.662426 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.662450 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.663657 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.663697 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.663718 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.663760 32073 instancegroups.go:398] Draining the node: "node-2b.local". I0320 08:32:52.664625 32073 instancegroups.go:417] deleting node "node-2b.local" from kubernetes I0320 08:32:52.664654 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.664678 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.665876 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.665919 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.665941 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.665981 32073 instancegroups.go:398] Draining the node: "node-2c.local". I0320 08:32:52.667289 32073 instancegroups.go:417] deleting node "node-2c.local" from kubernetes I0320 08:32:52.667340 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.667377 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.669455 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.669495 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. W0320 08:32:52.669517 32073 instancegroups.go:479] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0320 08:32:52.669536 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0320 08:32:52.669841 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0320 08:32:52.670164 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.670203 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.671421 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.671459 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.676724 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.676787 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.676810 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.676822 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.677654 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.678461 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.678490 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.678514 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.679723 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.679760 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.685032 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.685082 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.685993 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.686025 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.686049 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.687257 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.687294 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.692550 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.692588 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.692608 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.692622 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.693693 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.694547 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.694578 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.694602 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.695816 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.695865 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.701146 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.701215 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.702637 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.702681 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.702718 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.703947 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.703993 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.709247 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.709314 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.710843 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.710891 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.710931 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.712168 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.712202 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.717467 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.717507 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.717543 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.717569 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:52.719455 32073 instancegroups.go:398] Draining the node: "node-2a.local". I0320 08:32:52.720944 32073 instancegroups.go:417] deleting node "node-2a.local" from kubernetes I0320 08:32:52.720991 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.721038 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.722247 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.722285 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.727541 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.727592 32073 instancegroups.go:398] Draining the node: "node-2b.local". I0320 08:32:52.728465 32073 instancegroups.go:417] deleting node "node-2b.local" from kubernetes I0320 08:32:52.728496 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.728519 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.729757 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.729795 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.735062 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.735121 32073 instancegroups.go:398] Draining the node: "node-2c.local". I0320 08:32:52.736178 32073 instancegroups.go:417] deleting node "node-2c.local" from kubernetes I0320 08:32:52.736215 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.736243 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.737479 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.737514 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.742745 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.742783 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.07s) === RUN TestRollingUpdateEmptyGroup I0320 08:32:52.742943 32073 rollingupdate.go:93] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0320 08:32:52.744251 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.744304 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.745736 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.745797 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.745824 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0320 08:32:52.746435 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.746502 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.747699 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.747748 32073 instancegroups.go:513] Cluster did not validate within deadline: testing validation error. E0320 08:32:52.747785 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0320 08:32:52.748044 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.748074 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.748090 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0320 08:32:52.748215 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.748251 32073 instancegroups.go:513] Cluster did not validate within deadline: testing validation error. E0320 08:32:52.748266 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0320 08:32:52.748513 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.748542 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.749752 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.749781 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.755046 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.755108 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.755135 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.755148 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.755981 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.756781 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.756811 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.756835 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.758048 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.758083 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.758098 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0320 08:32:52.758322 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.758344 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.759554 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.759607 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.764940 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.764992 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.765010 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.765020 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.765604 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.766196 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.766218 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.766236 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.767451 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.767504 32073 instancegroups.go:513] Cluster did not validate within deadline: testing validation error. E0320 08:32:52.767522 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0320 08:32:52.767790 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.767816 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.767829 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.768923 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.769716 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.769745 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.769769 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.771001 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.771034 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.776291 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.776351 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.777273 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.777305 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.777329 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.778565 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.778611 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.783850 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.783911 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.784800 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.784830 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.784854 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.786082 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.786118 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.791343 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.791379 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0320 08:32:52.791696 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.791726 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.791744 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0320 08:32:52.791969 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.791996 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.792011 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0320 08:32:52.792241 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.792269 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.792285 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0320 08:32:52.792449 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.792477 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.792489 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.793519 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.794310 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.794341 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.794363 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.795554 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.795600 32073 instancegroups.go:523] Cluster did not pass validation within deadline: testing failure. E0320 08:32:52.795620 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0320 08:32:52.795802 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.795830 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.795843 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.796912 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.797699 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.797729 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.797752 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.798948 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.798989 32073 instancegroups.go:513] Cluster did not validate within deadline: testing validation error. E0320 08:32:52.799011 32073 instancegroups.go:475] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0320 08:32:52.799260 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.799289 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.800507 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.800555 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.801737 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.807007 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.808216 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.813494 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.814679 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.819973 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.820036 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.820095 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.820114 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.820862 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.821662 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.821693 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.821716 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.822927 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.822968 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.828238 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.828291 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.829254 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.829287 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.829311 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.830529 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.830579 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.835856 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.835901 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.835927 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.835941 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.836936 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.837729 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.837762 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.837786 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.838973 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.839027 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.844348 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.844406 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.845272 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.845303 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.845327 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.846545 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.846592 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.852336 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.852397 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.853258 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.853289 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.853313 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.854534 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.854581 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.859907 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.859942 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.859968 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.859982 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:52.861005 32073 instancegroups.go:398] Draining the node: "node-2a.local". I0320 08:32:52.861786 32073 instancegroups.go:417] deleting node "node-2a.local" from kubernetes I0320 08:32:52.861816 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.861839 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.863050 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.863097 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.868408 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.868466 32073 instancegroups.go:398] Draining the node: "node-2b.local". I0320 08:32:52.869412 32073 instancegroups.go:417] deleting node "node-2b.local" from kubernetes I0320 08:32:52.869444 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.869467 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.870691 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.870742 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.876072 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.876132 32073 instancegroups.go:398] Draining the node: "node-2c.local". I0320 08:32:52.876980 32073 instancegroups.go:417] deleting node "node-2c.local" from kubernetes I0320 08:32:52.877010 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.877034 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.878252 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.878299 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.883572 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.883609 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0320 08:32:52.883875 32073 instancegroups.go:593] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0320 08:32:52.883905 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.885120 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.885167 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.886330 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.887515 32073 instancegroups.go:526] Cluster did not pass validation, will retry in "1ms": testing failure. I0320 08:32:52.888700 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.893867 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.893929 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.893959 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.893973 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.894733 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.895564 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.895594 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.895617 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.896833 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.896872 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.902158 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.902211 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.903071 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.903102 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.903126 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.904346 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.904384 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.909633 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.909673 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.909695 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.909709 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.910704 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.911500 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.911532 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.911555 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.912754 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.912792 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.918070 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.918130 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.919001 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.919032 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.919055 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.920268 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.920305 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.925562 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.925615 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:52.926470 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:52.926500 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:52.926524 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.927726 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.927763 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.933030 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.933062 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.933083 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.933097 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:52.934164 32073 instancegroups.go:398] Draining the node: "node-2a.local". I0320 08:32:52.934951 32073 instancegroups.go:417] deleting node "node-2a.local" from kubernetes I0320 08:32:52.934981 32073 instancegroups.go:591] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0320 08:32:52.935004 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.936210 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.936254 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.941517 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.941578 32073 instancegroups.go:398] Draining the node: "node-2b.local". I0320 08:32:52.942470 32073 instancegroups.go:417] deleting node "node-2b.local" from kubernetes I0320 08:32:52.942501 32073 instancegroups.go:591] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0320 08:32:52.942525 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.943729 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.943767 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.949032 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.949085 32073 instancegroups.go:398] Draining the node: "node-2c.local". I0320 08:32:52.949956 32073 instancegroups.go:417] deleting node "node-2c.local" from kubernetes I0320 08:32:52.949987 32073 instancegroups.go:591] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0320 08:32:52.950011 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.951245 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.951283 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.956578 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.956613 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0320 08:32:52.957192 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.957218 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.957230 32073 instancegroups.go:306] Tainting 2 nodes in "node-1" instancegroup. I0320 08:32:52.957989 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:52.958803 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:52.958833 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:52.958856 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.960014 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.960050 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.965339 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.965390 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:52.966267 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:52.966297 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:52.966320 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.967535 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.967571 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.972853 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.972887 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.02s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0320 08:32:52.973129 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.973156 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.973168 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.973980 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:52.974775 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:52.974804 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:52.974827 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.976028 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.976065 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.981333 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.981383 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:52.982295 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:52.982326 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:52.982350 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:52.983563 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.983599 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.988838 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.988872 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.02s) === RUN TestRollingUpdateDisabled I0320 08:32:52.989280 32073 instancegroups.go:180] Rolling updates for InstanceGroup bastion-1 are disabled W0320 08:32:52.989326 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. I0320 08:32:52.989346 32073 instancegroups.go:180] Rolling updates for InstanceGroup master-1 are disabled W0320 08:32:52.989369 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. I0320 08:32:52.989402 32073 instancegroups.go:180] Rolling updates for InstanceGroup node-1 are disabled W0320 08:32:52.989415 32073 instancegroups.go:467] Not validating cluster as cloudonly flag is set. I0320 08:32:52.989431 32073 instancegroups.go:180] Rolling updates for InstanceGroup node-2 are disabled I0320 08:32:52.989457 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0320 08:32:52.989762 32073 instancegroups.go:570] Detaching instance "bastion-1a", in group "bastion-1". I0320 08:32:52.989819 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:52.991046 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.991080 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:52.996353 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.996390 32073 instancegroups.go:180] Rolling updates for InstanceGroup bastion-1 are disabled I0320 08:32:52.996450 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.996480 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.996500 32073 instancegroups.go:306] Tainting 2 nodes in "master-1" instancegroup. I0320 08:32:52.997325 32073 instancegroups.go:180] Rolling updates for InstanceGroup master-1 are disabled I0320 08:32:52.997357 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.997377 32073 instancegroups.go:503] Cluster validated. I0320 08:32:52.997390 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:52.998322 32073 instancegroups.go:568] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0320 08:32:52.998380 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:52.999604 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:52.999639 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:53.004903 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.004937 32073 instancegroups.go:180] Rolling updates for InstanceGroup node-1 are disabled I0320 08:32:53.004953 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.004972 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.004986 32073 instancegroups.go:306] Tainting 3 nodes in "node-2" instancegroup. I0320 08:32:53.006011 32073 instancegroups.go:568] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0320 08:32:53.006076 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:53.007280 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.007315 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:53.012542 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.012579 32073 instancegroups.go:180] Rolling updates for InstanceGroup node-2 are disabled I0320 08:32:53.012597 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0320 08:32:53.012887 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.012924 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.012942 32073 instancegroups.go:306] Tainting 7 nodes in "node-1" instancegroup. I0320 08:32:53.015190 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:53.016077 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:53.016112 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:53.016146 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.017381 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.017430 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.017476 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:53.017546 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:53.018923 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:53.018957 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:53.019310 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:53.019346 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:53.019378 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.020619 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.020684 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.121289 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.121345 32073 instancegroups.go:398] Draining the node: "node-1e.local". I0320 08:32:53.121456 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:53.122681 32073 instancegroups.go:417] deleting node "node-1e.local" from kubernetes I0320 08:32:53.122714 32073 instancegroups.go:591] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0320 08:32:53.123040 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:53.123077 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:53.123123 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.124334 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.124375 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.124408 32073 instancegroups.go:398] Draining the node: "node-1f.local". I0320 08:32:53.125246 32073 instancegroups.go:417] deleting node "node-1f.local" from kubernetes I0320 08:32:53.125274 32073 instancegroups.go:591] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0320 08:32:53.125303 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.126520 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.126601 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.227374 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.227445 32073 instancegroups.go:398] Draining the node: "node-1g.local". I0320 08:32:53.228418 32073 instancegroups.go:417] deleting node "node-1g.local" from kubernetes I0320 08:32:53.228451 32073 instancegroups.go:591] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0320 08:32:53.228488 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.229685 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.229732 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.229751 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.22s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0320 08:32:53.230002 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.230036 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.230050 32073 instancegroups.go:306] Tainting 6 nodes in "node-1" instancegroup. I0320 08:32:53.232014 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:53.232123 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:53.233241 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:53.233275 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:53.233580 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:53.233609 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:53.233638 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.234833 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.234901 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.335499 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.335566 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:53.335626 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:53.336943 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:53.336982 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:53.337325 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:53.337361 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:53.337393 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.338572 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.338615 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.338655 32073 instancegroups.go:398] Draining the node: "node-1e.local". I0320 08:32:53.340345 32073 instancegroups.go:417] deleting node "node-1e.local" from kubernetes I0320 08:32:53.340405 32073 instancegroups.go:591] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0320 08:32:53.340460 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.342213 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.342298 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.442630 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.443325 32073 instancegroups.go:398] Draining the node: "node-1f.local". I0320 08:32:53.444184 32073 instancegroups.go:417] deleting node "node-1f.local" from kubernetes I0320 08:32:53.444211 32073 instancegroups.go:591] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0320 08:32:53.444248 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.445475 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.445537 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.445558 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.22s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0320 08:32:53.445851 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.445885 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.445901 32073 instancegroups.go:306] Tainting 7 nodes in "master-1" instancegroup. I0320 08:32:53.448112 32073 instancegroups.go:398] Draining the node: "master-1a.local". I0320 08:32:53.448964 32073 instancegroups.go:417] deleting node "master-1a.local" from kubernetes I0320 08:32:53.448997 32073 instancegroups.go:591] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0320 08:32:53.449033 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.450245 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.450309 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.450358 32073 instancegroups.go:398] Draining the node: "master-1c.local". I0320 08:32:53.450444 32073 instancegroups.go:398] Draining the node: "master-1b.local". I0320 08:32:53.451731 32073 instancegroups.go:417] deleting node "master-1c.local" from kubernetes I0320 08:32:53.451772 32073 instancegroups.go:591] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0320 08:32:53.452037 32073 instancegroups.go:417] deleting node "master-1b.local" from kubernetes I0320 08:32:53.452068 32073 instancegroups.go:591] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0320 08:32:53.452116 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.453318 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.453387 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.553930 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.553985 32073 instancegroups.go:398] Draining the node: "master-1e.local". I0320 08:32:53.554046 32073 instancegroups.go:398] Draining the node: "master-1d.local". I0320 08:32:53.555606 32073 instancegroups.go:417] deleting node "master-1e.local" from kubernetes I0320 08:32:53.555641 32073 instancegroups.go:591] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0320 08:32:53.556012 32073 instancegroups.go:417] deleting node "master-1d.local" from kubernetes I0320 08:32:53.556046 32073 instancegroups.go:591] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0320 08:32:53.556101 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.557334 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.557384 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.557427 32073 instancegroups.go:398] Draining the node: "master-1f.local". I0320 08:32:53.558292 32073 instancegroups.go:417] deleting node "master-1f.local" from kubernetes I0320 08:32:53.558326 32073 instancegroups.go:591] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0320 08:32:53.558357 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.559570 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.559642 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.660306 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.660389 32073 instancegroups.go:398] Draining the node: "master-1g.local". I0320 08:32:53.661388 32073 instancegroups.go:417] deleting node "master-1g.local" from kubernetes I0320 08:32:53.661425 32073 instancegroups.go:591] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0320 08:32:53.661465 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.662686 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.662732 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.662750 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.22s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0320 08:32:53.662995 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.663029 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.663045 32073 instancegroups.go:306] Tainting 6 nodes in "node-1" instancegroup. I0320 08:32:53.664892 32073 instancegroups.go:568] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0320 08:32:53.664957 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:53.666164 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.666218 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.666233 32073 instancegroups.go:568] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0320 08:32:53.666294 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:53.667520 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.667564 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.667608 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:53.667689 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:53.668969 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:53.669003 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:53.669353 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:53.669393 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:53.669428 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.670625 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.670695 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.771238 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.771310 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:53.771373 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:53.772825 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:53.772862 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:53.773209 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:53.773240 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:53.773276 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.774496 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.774558 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.774611 32073 instancegroups.go:398] Draining the node: "node-1e.local". I0320 08:32:53.775645 32073 instancegroups.go:417] deleting node "node-1e.local" from kubernetes I0320 08:32:53.775677 32073 instancegroups.go:591] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0320 08:32:53.775720 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.777017 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.777224 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.877909 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.877986 32073 instancegroups.go:398] Draining the node: "node-1f.local". I0320 08:32:53.879048 32073 instancegroups.go:417] deleting node "node-1f.local" from kubernetes I0320 08:32:53.879087 32073 instancegroups.go:591] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0320 08:32:53.879135 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.880364 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.880412 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.880432 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.22s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0320 08:32:53.880719 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.880753 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.880767 32073 instancegroups.go:306] Tainting 6 nodes in "node-1" instancegroup. I0320 08:32:53.882728 32073 instancegroups.go:568] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0320 08:32:53.882782 32073 instancegroups.go:568] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0320 08:32:53.882824 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:53.884008 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.884053 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.884101 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:53.884164 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:53.885569 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:53.885605 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:53.885959 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:53.885995 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:53.886029 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.887269 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.887340 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.987844 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.987926 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:53.987987 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:53.989443 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:53.989481 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:53.989819 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:53.989856 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:53.989891 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.991092 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.991141 32073 instancegroups.go:503] Cluster validated. I0320 08:32:53.991182 32073 instancegroups.go:398] Draining the node: "node-1e.local". I0320 08:32:53.992136 32073 instancegroups.go:417] deleting node "node-1e.local" from kubernetes I0320 08:32:53.992170 32073 instancegroups.go:591] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0320 08:32:53.992206 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:53.993409 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:53.993479 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.094343 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.094428 32073 instancegroups.go:398] Draining the node: "node-1f.local". I0320 08:32:54.095500 32073 instancegroups.go:417] deleting node "node-1f.local" from kubernetes I0320 08:32:54.095537 32073 instancegroups.go:591] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0320 08:32:54.095585 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.096802 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.096848 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.096872 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.22s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0320 08:32:54.097163 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.097188 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.097201 32073 instancegroups.go:306] Tainting 2 nodes in "node-1" instancegroup. I0320 08:32:54.098284 32073 instancegroups.go:568] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0320 08:32:54.098340 32073 instancegroups.go:568] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0320 08:32:54.098395 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:54.099588 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.099651 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:54.104954 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.105020 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:54.105098 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:54.106415 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:54.106451 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:54.106476 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.106798 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:54.106836 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:54.106861 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.107710 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.107745 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:54.113036 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.113070 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.02s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0320 08:32:54.113314 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.113352 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.113366 32073 instancegroups.go:306] Tainting 4 nodes in "node-1" instancegroup. I0320 08:32:54.114674 32073 instancegroups.go:568] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0320 08:32:54.114733 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:54.115923 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.115971 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.115985 32073 instancegroups.go:568] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0320 08:32:54.116035 32073 instancegroups.go:167] waiting for 1ms after detaching instance I0320 08:32:54.117237 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.117280 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.117335 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:54.117401 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:54.117455 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:54.119110 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:54.119146 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:54.119183 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.119502 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:54.119540 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:54.119574 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.119905 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:54.119942 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:54.119975 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.120400 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.221310 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.221370 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:54.222284 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:54.222318 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:54.222352 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.223571 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.223616 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.223634 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0320 08:32:54.223866 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.223901 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.223915 32073 instancegroups.go:306] Tainting 7 nodes in "node-1" instancegroup. I0320 08:32:54.226146 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:54.227330 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:54.227368 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:54.227410 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.228638 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.228684 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.228727 32073 instancegroups.go:398] Draining the node: "node-1e.local". I0320 08:32:54.228754 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:54.230019 32073 instancegroups.go:417] deleting node "node-1e.local" from kubernetes I0320 08:32:54.230055 32073 instancegroups.go:591] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0320 08:32:54.230297 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:54.230330 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:54.230363 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.231563 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.231625 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.332351 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.332433 32073 instancegroups.go:398] Draining the node: "node-1g.local". I0320 08:32:54.332499 32073 instancegroups.go:398] Draining the node: "node-1f.local". I0320 08:32:54.334048 32073 instancegroups.go:417] deleting node "node-1g.local" from kubernetes I0320 08:32:54.334084 32073 instancegroups.go:591] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0320 08:32:54.334422 32073 instancegroups.go:417] deleting node "node-1f.local" from kubernetes I0320 08:32:54.334458 32073 instancegroups.go:591] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0320 08:32:54.334494 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.335684 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.335732 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.335775 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:54.336654 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:54.336687 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:54.336717 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.337923 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.337987 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.438590 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.438673 32073 instancegroups.go:398] Draining the node: "node-1d.local". I0320 08:32:54.439719 32073 instancegroups.go:417] deleting node "node-1d.local" from kubernetes I0320 08:32:54.439757 32073 instancegroups.go:591] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0320 08:32:54.439797 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.440996 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.441046 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.441067 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.22s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0320 08:32:54.441339 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.441366 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.441387 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-a" I0320 08:32:54.441409 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-b" I0320 08:32:54.441428 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-c" I0320 08:32:54.441445 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0320 08:32:54.441591 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.441616 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.441630 32073 instancegroups.go:306] Tainting 3 nodes in "node-1" instancegroup. I0320 08:32:54.442702 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-a" I0320 08:32:54.442739 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-b" I0320 08:32:54.442759 32073 instancegroups.go:131] deleting warm pool instance "node-1-wp-c" I0320 08:32:54.442801 32073 instancegroups.go:398] Draining the node: "node-1a.local". I0320 08:32:54.443598 32073 instancegroups.go:417] deleting node "node-1a.local" from kubernetes I0320 08:32:54.443629 32073 instancegroups.go:591] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0320 08:32:54.443651 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.444846 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.444882 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:54.450132 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.450183 32073 instancegroups.go:398] Draining the node: "node-1b.local". I0320 08:32:54.451068 32073 instancegroups.go:417] deleting node "node-1b.local" from kubernetes I0320 08:32:54.451104 32073 instancegroups.go:591] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0320 08:32:54.451128 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.452367 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.452403 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:54.457726 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.457777 32073 instancegroups.go:398] Draining the node: "node-1c.local". I0320 08:32:54.458720 32073 instancegroups.go:417] deleting node "node-1c.local" from kubernetes I0320 08:32:54.458788 32073 instancegroups.go:591] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0320 08:32:54.458827 32073 instancegroups.go:435] waiting for 1ms after terminating instance I0320 08:32:54.460007 32073 instancegroups.go:470] Validating the cluster. I0320 08:32:54.460047 32073 instancegroups.go:506] Cluster validated; revalidating in 5ms to make sure it does not flap. I0320 08:32:54.465276 32073 instancegroups.go:503] Cluster validated. I0320 08:32:54.465312 32073 rollingupdate.go:208] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.990s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.041s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) PASS ok k8s.io/kops/pkg/k8scodecs 0.097s === RUN TestParse E0320 08:32:27.398200 28047 versions.go:96] unable to parse Kubernetes version "" E0320 08:32:27.398271 28047 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.063s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.02s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.053s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port --- PASS: TestBuildKubecfg (0.16s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.04s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.02s) PASS ok k8s.io/kops/pkg/kubeconfig 0.226s ? k8s.io/kops/pkg/kubemanifest [no test files] === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.05s) PASS ok k8s.io/kops/pkg/model 0.170s ? k8s.io/kops/pkg/model/alimodel [no test files] === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Master === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Master (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.048s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.110s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN TestFeatureGates --- PASS: TestFeatureGates (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.167s ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] === RUN Test_RunEtcdManagerBuilder === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/pollinterval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/old_versions_mount_hosts === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0320 08:32:38.404043 31301 model.go:360] overriding log level in manifest (embedded etcd manifest), new level is 3 W0320 08:32:38.404141 31301 model.go:524] overloading ENV var in manifest (embedded etcd manifest) with ETCD_QUOTA_BACKEND_BYTES=10737418240 W0320 08:32:38.405013 31301 model.go:360] overriding log level in manifest (embedded etcd manifest), new level is 3 W0320 08:32:38.405095 31301 model.go:524] overloading ENV var in manifest (embedded etcd manifest) with ETCD_QUOTA_BACKEND_BYTES=10737418240 --- PASS: Test_RunEtcdManagerBuilder (0.08s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.05s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/pollinterval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/old_versions_mount_hosts (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.01s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.137s === RUN Test_RunKubeApiserverBuilder === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.06s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.06s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.132s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.026s ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] === RUN TestIAMPrefix --- PASS: TestIAMPrefix (0.00s) === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.118s === RUN TestServerGroupBuilder --- PASS: TestServerGroupBuilder (0.22s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.278s ? k8s.io/kops/pkg/model/resources [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.020s ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.03s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.03s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.049s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.01s) --- PASS: TestGenerateCertificate/selfsigned (0.01s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (1.13s) --- PASS: TestIssueCert/ca (0.30s) --- PASS: TestIssueCert/client (0.51s) --- PASS: TestIssueCert/clientOneYear (0.31s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTrip --- PASS: TestPrivateKeyRoundTrip (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 1.141s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.039s ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resources/ali [no test files] === RUN TestAddUntaggedRouteTables I0320 08:32:38.842624 31525 routetable.go:53] DescribeRouteTables: { } W0320 08:32:38.842723 31525 tags.go:67] cluster tag not found on route-table:rtb-1234 I0320 08:32:38.842743 31525 aws.go:225] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListRouteTables I0320 08:32:38.842835 31525 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0320 08:32:38.842933 31525 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0320 08:32:38.843020 31525 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0320 08:32:38.843112 31525 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0320 08:32:38.843144 31525 volumes.go:117] DescribeVolumes: { } W0320 08:32:38.843176 31525 aws.go:2173] (new) cluster tag not found on volume:vol-2 aws_test.go:192: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0320 08:32:38.843461 31525 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:38.843499 31525 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:38.843533 31525 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:38.843597 31525 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:38.843675 31525 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:38.843696 31525 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:38.843726 31525 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:38.843758 31525 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:38.843778 31525 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:38.843801 31525 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0320 08:32:38.843835 31525 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0320 08:32:38.843861 31525 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0320 08:32:38.843897 31525 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0320 08:32:38.843924 31525 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0320 08:32:38.843959 31525 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0320 08:32:38.843997 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0320 08:32:38.844026 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0320 08:32:38.844054 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0320 08:32:38.844078 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0320 08:32:38.844105 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0320 08:32:38.844129 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0320 08:32:38.844157 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0320 08:32:38.844191 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0320 08:32:38.844219 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0320 08:32:38.844255 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0320 08:32:38.844282 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0320 08:32:38.844305 31525 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.051s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.061s ? k8s.io/kops/pkg/resources/digitalocean [no test files] === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/pkg/resources/digitalocean/dns 0.021s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.131s ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.008s ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/try [no test files] === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.016s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.024s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.073s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.03s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.077s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.056s ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/ali [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.006s ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] === RUN TestRemovesDuplicateGuardedBlocks --- PASS: TestRemovesDuplicateGuardedBlocks (0.01s) === RUN TestRecoversFromBadNesting W0320 08:32:31.404719 29622 hosts.go:72] /etc/hosts guard-block end seen before guard-block start; will ignore end W0320 08:32:31.404778 29622 hosts.go:61] /etc/hosts guard-block begin seen while in guard block; will ignore W0320 08:32:31.404787 29622 hosts.go:72] /etc/hosts guard-block end seen before guard-block start; will ignore end W0320 08:32:31.404795 29622 hosts.go:72] /etc/hosts guard-block end seen before guard-block start; will ignore end W0320 08:32:31.404804 29622 hosts.go:61] /etc/hosts guard-block begin seen while in guard block; will ignore W0320 08:32:31.404811 29622 hosts.go:61] /etc/hosts guard-block begin seen while in guard block; will ignore W0320 08:32:31.404819 29622 hosts.go:61] /etc/hosts guard-block begin seen while in guard block; will ignore --- PASS: TestRecoversFromBadNesting (0.01s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.041s ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/gce [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/hostmount [no test files] === RUN Test_VolumeSort_ByEtcdClusterName --- PASS: Test_VolumeSort_ByEtcdClusterName (0.00s) === RUN Test_Mount_Volumes W0320 08:32:42.890169 31979 volume_mounter.go:288] Local device: "/dev/xvda", volume id: "" is being skipped and will not mounted, since it does not have a etcd cluster --- PASS: Test_Mount_Volumes (0.00s) PASS ok k8s.io/kops/protokube/pkg/protokube 0.047s === RUN TestBuildEtcdManifest --- PASS: TestBuildEtcdManifest (0.02s) PASS ok k8s.io/kops/protokube/tests/integration/build_etcd_manifest 0.071s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.02s) PASS ok k8s.io/kops/tests/codecs 0.063s ? k8s.io/kops/tests/fuzz [no test files] === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.03s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.03s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.01s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.146s ? k8s.io/kops/tests/integration/channel/simple [no test files] === RUN TestConversionMinimal --- PASS: TestConversionMinimal (0.09s) PASS ok k8s.io/kops/tests/integration/conversion 0.161s ? k8s.io/kops/upup/models [no test files] === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN TestWriteFile I0320 08:32:36.338341 30535 files.go:58] Writing file "/tmp/fitest1921379969/SubDir/test1.tmp" I0320 08:32:36.338511 30535 files.go:114] Changing file mode for "/tmp/fitest1921379969/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.01s) === RUN TestVFSCAStoreRoundTripWithVault vfs_castore_test.go:239: No vault dev token set --- SKIP: TestVFSCAStoreRoundTripWithVault (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.055s === RUN Test_BuildVFSPath E0320 08:32:34.738498 30140 copyfile.go:247] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0320 08:32:34.738554 30140 copyfile.go:248] S3, Google Cloud Storage, and File Paths are supported. E0320 08:32:34.738564 30140 copyfile.go:249] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0320 08:32:34.738573 30140 copyfile.go:250] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/assettasks 0.112s === RUN TestBootstrapChannelBuilder_BuildTasks I0320 08:32:42.653034 31948 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:42.653145 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:42.653186 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:42.653230 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:42.653265 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:42.653280 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:42.653306 31948 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:42.653332 31948 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:42.653352 31948 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:42.669289 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.718644 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.812115 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.875550 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:42.943628 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:43.016327 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:43.083363 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:43.173563 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:43.254248 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:44.304921 31948 zones.go:91] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (2.72s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0320 08:32:45.368776 31948 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.368857 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.368886 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.368918 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.368942 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.368966 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.368984 31948 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.369004 31948 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.369020 31948 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.369075 31948 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=true I0320 08:32:45.369861 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.426835 31948 featureflag.go:165] FeatureFlag "UseServiceAccountIAM"=false --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.06s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0320 08:32:45.427125 31948 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:45.427205 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0320 08:32:45.427249 31948 subnets.go:168] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0320 08:32:45.427290 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0320 08:32:45.427324 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0320 08:32:45.427340 31948 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0320 08:32:45.427357 31948 iamrole.go:55] CreateRole: { RoleName: "kops-custom-node-role" } I0320 08:32:45.427377 31948 iaminstanceprofile.go:53] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0320 08:32:45.427392 31948 iaminstanceprofile.go:94] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0320 08:32:45.427408 31948 featureflag.go:165] FeatureFlag "EnableExternalCloudController"=true I0320 08:32:45.428221 31948 zones.go:91] ListHostedZonesPages { } I0320 08:32:45.520839 31948 featureflag.go:165] FeatureFlag "EnableExternalCloudController"=false --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.09s) === RUN TestContainerdVersionUrlHash === RUN TestContainerdVersionUrlHash/1.3.4-amd64 === RUN TestContainerdVersionUrlHash/1.3.4-arm64 === RUN TestContainerdVersionUrlHash/1.3.10-amd64 === RUN TestContainerdVersionUrlHash/1.3.10-arm64 === RUN TestContainerdVersionUrlHash/1.4.1-amd64 === RUN TestContainerdVersionUrlHash/1.4.1-arm64 === RUN TestContainerdVersionUrlHash/1.4.4-amd64 === RUN TestContainerdVersionUrlHash/1.4.4-arm64 --- PASS: TestContainerdVersionUrlHash (0.00s) --- PASS: TestContainerdVersionUrlHash/1.3.4-amd64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.3.4-arm64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.3.10-amd64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.3.10-arm64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.4.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.4.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.4.4-amd64 (0.00s) --- PASS: TestContainerdVersionUrlHash/1.4.4-arm64 (0.00s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.3.5-amd64 === RUN TestContainerdVersionUrl/1.3.5-arm64 === RUN TestContainerdVersionUrl/1.3.4-amd64 === RUN TestContainerdVersionUrl/1.3.4-arm64 === RUN TestContainerdVersionUrl/1.4.1-amd64 === RUN TestContainerdVersionUrl/1.4.1-arm64 === RUN TestContainerdVersionUrl/1.4.3-amd64 === RUN TestContainerdVersionUrl/1.4.3-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.3.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.3.5-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.3.4-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.3.4-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.4.3-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.4.3-arm64 (0.00s) === RUN TestContainerdVersionHash === RUN TestContainerdVersionHash/1.4.1- === RUN TestContainerdVersionHash/1.4.1-arm === RUN TestContainerdVersionHash/-amd64 === RUN TestContainerdVersionHash/-arm64 === RUN TestContainerdVersionHash/1.1.1-amd64 === RUN TestContainerdVersionHash/1.1.1-arm64 === RUN TestContainerdVersionHash/1.3.5-amd64 === RUN TestContainerdVersionHash/1.3.5-arm64 === RUN TestContainerdVersionHash/1.4.1-amd64 === RUN TestContainerdVersionHash/1.4.1-arm64 === RUN TestContainerdVersionHash/1.4.3-amd64 === RUN TestContainerdVersionHash/1.4.3-arm64 --- PASS: TestContainerdVersionHash (0.00s) --- PASS: TestContainerdVersionHash/1.4.1- (0.00s) --- PASS: TestContainerdVersionHash/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionHash/-amd64 (0.00s) --- PASS: TestContainerdVersionHash/-arm64 (0.00s) --- PASS: TestContainerdVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionHash/1.3.5-amd64 (0.00s) --- PASS: TestContainerdVersionHash/1.3.5-arm64 (0.00s) --- PASS: TestContainerdVersionHash/1.4.1-amd64 (0.00s) --- PASS: TestContainerdVersionHash/1.4.1-arm64 (0.00s) --- PASS: TestContainerdVersionHash/1.4.3-amd64 (0.00s) --- PASS: TestContainerdVersionHash/1.4.3-arm64 (0.00s) === RUN TestContainerdVersionsHashesAmd64 containerd_test.go:316: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestContainerdVersionsHashesAmd64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:57: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:69: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:83: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults --- PASS: Test_FindCNIAssetFromDefaults (0.10s) === RUN Test_FindLyftAssetFromEnvironmentVariable --- PASS: Test_FindLyftAssetFromEnvironmentVariable (0.00s) === RUN Test_FindLyftAssetFromDefaults --- PASS: Test_FindLyftAssetFromDefaults (0.00s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0320 08:32:45.648609 31948 new_cluster.go:871] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_Kubenet --- PASS: TestPopulateCluster_Kubenet (0.00s) === RUN TestPopulateCluster_CNI --- PASS: TestPopulateCluster_CNI (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_TopologyInvalidNil_Required --- PASS: TestPopulateCluster_TopologyInvalidNil_Required (0.00s) === RUN TestPopulateCluster_TopologyInvalidValue_Required --- PASS: TestPopulateCluster_TopologyInvalidValue_Required (0.00s) === RUN TestPopulateCluster_BastionInvalidMatchingValues_Required --- PASS: TestPopulateCluster_BastionInvalidMatchingValues_Required (0.00s) === RUN TestPopulateCluster_BastionIdleTimeoutInvalidNegative_Required --- PASS: TestPopulateCluster_BastionIdleTimeoutInvalidNegative_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.01s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN Test_AssignSubnets I0320 08:32:45.679084 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet a I0320 08:32:45.679112 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet a I0320 08:32:45.679124 31948 subnets.go:180] Assigned CIDR 10.64.0.0/11 to subnet b I0320 08:32:45.679145 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet b I0320 08:32:45.679157 31948 subnets.go:180] Assigned CIDR 10.64.0.0/11 to subnet a I0320 08:32:45.679177 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet b I0320 08:32:45.679198 31948 subnets.go:180] Assigned CIDR 10.160.0.0/11 to subnet b I0320 08:32:45.679219 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet a I0320 08:32:45.679232 31948 subnets.go:194] Assigned CIDR 10.0.0.0/14 to subnet a I0320 08:32:45.679255 31948 subnets.go:180] Assigned CIDR 10.32.0.0/11 to subnet a I0320 08:32:45.679267 31948 subnets.go:180] Assigned CIDR 10.64.0.0/11 to subnet b I0320 08:32:45.679277 31948 subnets.go:180] Assigned CIDR 10.96.0.0/11 to subnet b I0320 08:32:45.679288 31948 subnets.go:180] Assigned CIDR 10.128.0.0/11 to subnet c I0320 08:32:45.679299 31948 subnets.go:180] Assigned CIDR 10.160.0.0/11 to subnet c I0320 08:32:45.679311 31948 subnets.go:194] Assigned CIDR 10.0.0.0/14 to subnet a I0320 08:32:45.679323 31948 subnets.go:194] Assigned CIDR 10.4.0.0/14 to subnet b I0320 08:32:45.679335 31948 subnets.go:194] Assigned CIDR 10.8.0.0/14 to subnet c --- PASS: Test_AssignSubnets (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/images/protokube-linux-amd64 === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/images/protokube-linux-arm64 === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/images/protokube-linux-amd64 (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/images/protokube-linux-arm64 (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 3.100s ? k8s.io/kops/upup/pkg/fi/cloudup/alitasks [no test files] === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/aliup 0.082s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0320 08:32:40.707388 31772 target.go:107] Terraform output is in /tmp/kops-render-2339441348 I0320 08:32:40.709842 31772 target.go:107] Terraform output is in /tmp/kops-render-2339441348 --- PASS: TestAutoscalingGroupTerraformRender (0.01s) === RUN TestAutoscalingGroupCloudformationRender I0320 08:32:40.711298 31772 target.go:169] Cloudformation output is in /tmp/kops-render-1523090496 --- PASS: TestAutoscalingGroupCloudformationRender (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestElasticIPCreate I0320 08:32:40.712466 31772 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0320 08:32:40.712623 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.712950 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0320 08:32:40.713048 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.713106 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.713156 31772 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0320 08:32:40.713245 31772 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0320 08:32:40.713573 31772 subnets.go:93] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0320 08:32:40.713647 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.713708 31772 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0320 08:32:40.713820 31772 tags.go:163] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.714057 31772 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0320 08:32:40.714145 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.714192 31772 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" },{ Key: "AssociatedElasticIp", Value: "192.0.2.1" }] } I0320 08:32:40.714263 31772 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0320 08:32:40.714496 31772 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0320 08:32:40.714563 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.714631 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.714659 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.714699 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.714736 31772 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0320 08:32:40.714792 31772 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0320 08:32:40.714891 31772 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0320 08:32:40.714946 31772 tags.go:163] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.715019 31772 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0320 08:32:40.715068 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0320 08:32:40.715148 31772 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0320 08:32:40.715384 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0320 08:32:40.715460 31772 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0320 08:32:40.715509 31772 internetgateways.go:66] CreateInternetGateway: { } I0320 08:32:40.715553 31772 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0320 08:32:40.715722 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.715785 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.715846 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.715874 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.716003 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.716041 31772 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0320 08:32:40.716089 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.716179 31772 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0320 08:32:40.716283 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0320 08:32:40.716444 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.716520 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.716581 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.716605 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.716653 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.716719 31772 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0320 08:32:40.716801 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateCloudformationRender I0320 08:32:40.717955 31772 target.go:169] Cloudformation output is in /tmp/kops-render-2151781848 I0320 08:32:40.718332 31772 target.go:169] Cloudformation output is in /tmp/kops-render-2151781848 --- PASS: TestLaunchTemplateCloudformationRender (0.00s) === RUN TestLaunchTemplateTerraformRender I0320 08:32:40.721667 31772 target.go:107] Terraform output is in /tmp/kops-render-1069667225 I0320 08:32:40.724319 31772 target.go:107] Terraform output is in /tmp/kops-render-1069667225 --- PASS: TestLaunchTemplateTerraformRender (0.01s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0320 08:32:40.724895 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.724962 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.725084 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0320 08:32:40.725127 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.725151 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.725175 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.725241 31772 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0320 08:32:40.725448 31772 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0320 08:32:40.725498 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0320 08:32:40.725527 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0320 08:32:40.725670 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.725725 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.725768 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.725783 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.725812 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.725835 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.725871 31772 securitygroups.go:110] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0320 08:32:40.725933 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0320 08:32:40.726276 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.726317 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.726398 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0320 08:32:40.726432 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.726454 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.726475 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.726513 31772 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0320 08:32:40.726595 31772 subnets.go:93] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0320 08:32:40.726628 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.726654 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0320 08:32:40.727107 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.727148 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.727188 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.727202 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.727226 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.727247 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.727280 31772 subnets.go:111] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0320 08:32:40.727332 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0320 08:32:40.727463 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0320 08:32:40.727522 31772 subnets.go:93] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0320 08:32:40.727641 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.727678 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.727714 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.727728 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.727791 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.727816 31772 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0320 08:32:40.727844 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.727875 31772 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0320 08:32:40.727956 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0320 08:32:40.727978 31772 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0320 08:32:40.728004 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0320 08:32:40.728126 31772 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0320 08:32:40.728175 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.728212 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.728226 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.728255 31772 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0320 08:32:40.728286 31772 subnets.go:111] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0320 08:32:40.728332 31772 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0320 08:32:40.728541 31772 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0320 08:32:40.728581 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.728654 31772 vpcs.go:87] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0320 08:32:40.728683 31772 tags.go:163] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0320 08:32:40.728701 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.728720 31772 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0320 08:32:40.728836 31772 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0320 08:32:40.728881 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0320 08:32:40.728919 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.728932 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.728954 31772 vpcs.go:110] DescribeVpcs: { VpcIds: ["vpc-1"] } I0320 08:32:40.728974 31772 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0320 08:32:40.729146 31772 vpcs.go:239] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0320 08:32:40.729285 31772 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0320 08:32:40.729323 31772 vpcs.go:110] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0320 08:32:40.729361 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0320 08:32:40.729373 31772 vpcs.go:165] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0320 08:32:40.729400 31772 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.061s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.031s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.101s === RUN TestDiskRenderAzure I0320 08:32:37.974897 31172 disk.go:104] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0320 08:32:37.975326 31172 disk.go:104] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0320 08:32:37.975542 31172 loadbalancer.go:126] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:119: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":null,"ResourceGroup":{"Name":"rg","Lifecycle":null,"Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":null,"ResourceGroup":null,"VirtualNetwork":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0320 08:32:37.976035 31172 loadbalancer.go:126] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0320 08:32:37.976235 31172 publicipaddress.go:103] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:98: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":null,"ResourceGroup":{"Name":"rg","Lifecycle":null,"Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0320 08:32:37.976550 31172 publicipaddress.go:103] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0320 08:32:37.977047 31172 resourcegroup.go:102] Creating a new Resource Group with name: rg I0320 08:32:37.977061 31172 resourcegroup.go:104] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0320 08:32:37.977270 31172 resourcegroup.go:102] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0320 08:32:37.977707 31172 subnet.go:105] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0320 08:32:37.977896 31172 virtualnetwork.go:115] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0320 08:32:37.978124 31172 virtualnetwork.go:115] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0320 08:32:37.978381 31172 vmscaleset.go:264] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0320 08:32:37.978619 31172 vmscaleset.go:264] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.048s ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/cloudformation [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.054s ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gcetasks [no test files] === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 0.046s === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.023s ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] === RUN TestWriteValue === RUN TestWriteValue/null === RUN TestWriteValue/empty_list === RUN TestWriteValue/string === RUN TestWriteValue/list === RUN TestWriteValue/list_of_objects === RUN TestWriteValue/object_block --- PASS: TestWriteValue (0.00s) --- PASS: TestWriteValue/null (0.00s) --- PASS: TestWriteValue/empty_list (0.00s) --- PASS: TestWriteValue/string (0.00s) --- PASS: TestWriteValue/list (0.00s) --- PASS: TestWriteValue/list_of_objects (0.00s) --- PASS: TestWriteValue/object_block (0.00s) === RUN TestWriteLiteral === RUN TestWriteLiteral/string === RUN TestWriteLiteral/traversal === RUN TestWriteLiteral/file --- PASS: TestWriteLiteral (0.00s) --- PASS: TestWriteLiteral/string (0.00s) --- PASS: TestWriteLiteral/traversal (0.00s) --- PASS: TestWriteLiteral/file (0.00s) === RUN TestWriteLiteralList === RUN TestWriteLiteralList/empty_list === RUN TestWriteLiteralList/one_literal === RUN TestWriteLiteralList/two_literals === RUN TestWriteLiteralList/one_traversal_literal,_one_string_literal --- PASS: TestWriteLiteralList (0.00s) --- PASS: TestWriteLiteralList/empty_list (0.00s) --- PASS: TestWriteLiteralList/one_literal (0.00s) --- PASS: TestWriteLiteralList/two_literals (0.00s) --- PASS: TestWriteLiteralList/one_traversal_literal,_one_string_literal (0.00s) === RUN TestWriteMap === RUN TestWriteMap/empty_map === RUN TestWriteMap/simple_map === RUN TestWriteMap/complex_keys --- PASS: TestWriteMap (0.00s) --- PASS: TestWriteMap/empty_map (0.00s) --- PASS: TestWriteMap/simple_map (0.00s) --- PASS: TestWriteMap/complex_keys (0.00s) === RUN TestWriteMapLiterals === RUN TestWriteMapLiterals/literal_values --- PASS: TestWriteMapLiterals (0.00s) --- PASS: TestWriteMapLiterals/literal_values (0.00s) === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.038s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.066s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.023s ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/cloudinit [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0320 08:32:43.082741 31997 bindmount.go:224] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0320 08:32:43.082796 31997 bindmount.go:233] running mount command [mount -o remount,exec /containerized_mounter] I0320 08:32:43.082808 31997 bindmount.go:224] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0320 08:32:43.082818 31997 bindmount.go:244] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0320 08:32:43.082828 31997 bindmount.go:224] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0320 08:32:43.082838 31997 bindmount.go:224] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0320 08:32:43.082853 31997 bindmount.go:224] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0320 08:32:43.083266 31997 service.go:91] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.053s ? k8s.io/kops/upup/pkg/fi/secrets [no test files] === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.049s ? k8s.io/kops/upup/pkg/kutil [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.024s ? k8s.io/kops/util/pkg/env [no test files] === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.037s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.006s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.027s ? k8s.io/kops/util/pkg/mirrors [no test files] === RUN TestGetProxyEnvVars W0320 08:32:39.457382 31712 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.013s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.020s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.008s ? k8s.io/kops/util/pkg/tables [no test files] === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.009s ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestBuildVaultPath context_test.go:27: No vault dev token set --- SKIP: TestBuildVaultPath (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) === RUN Test_newVaultPath vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_newVaultPath (0.00s) === RUN Test_newVaultPathHostOnly --- PASS: Test_newVaultPathHostOnly (0.00s) === RUN Test_WriteFileReadFile vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_WriteFileReadFile (0.00s) === RUN Test_WriteFileDeleteFile vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_WriteFileDeleteFile (0.00s) === RUN Test_CreateFile vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_CreateFile (0.00s) === RUN Test_ReadFile vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_ReadFile (0.00s) === RUN Test_Join vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_Join (0.00s) === RUN Test_VaultReadDirList vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_VaultReadDirList (0.00s) === RUN Test_ReadDir vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_ReadDir (0.00s) === RUN Test_IsDirectory vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_IsDirectory (0.00s) === RUN Test_VaultReadTree vaultfs_test.go:36: No vault dev token set. Skipping --- SKIP: Test_VaultReadTree (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.016s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... kubernetes so:libc.musl-x86_64.so.1 >>> kops*: Package size: 148.5 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.21.1-r4.apk >>> kops: Build complete at Sun, 20 Mar 2022 08:33:27 +0000 elapsed time 0h 2m 51s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/3) Purging .makedepends-kops (20220320.083037) (2/3) Purging kubernetes (1.23.5-r1) (3/3) Purging go (1.18-r0) Executing busybox-1.35.0-r5.trigger OK: 331 MiB in 99 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...