>>> kops: Building testing/kops 1.28.4-r0 (using abuild 3.12.0-r3) started Tue, 06 Feb 2024 06:43:21 +0000 >>> kops: Checking sanity of /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/5) Installing kubernetes (1.29.1-r0) (2/5) Installing go (1.21.6-r0) (3/5) Installing readline (8.2.10-r0) (4/5) Installing bash (5.2.26-r0) Executing bash-5.2.26-r0.post-install (5/5) Installing .makedepends-kops (20240206.064323) Executing busybox-1.36.1-r19.trigger OK: 555 MiB in 111 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 146 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (22) The requested URL returned error: 404 >>> kops: Fetching kops-1.28.4.tar.gz::https://github.com/kubernetes/kops/archive/v1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 7488k 0 7488k 0 0 7328k 0 --:--:-- 0:00:01 --:--:-- 7328k 100 14.1M 0 14.1M 0 0 7158k 0 --:--:-- 0:00:02 --:--:-- 6987k 100 19.8M 0 19.8M 0 0 6721k 0 --:--:-- 0:00:03 --:--:-- 6413k 100 25.2M 0 25.2M 0 0 6420k 0 --:--:-- 0:00:04 --:--:-- 6113k 100 30.7M 0 30.7M 0 0 6268k 0 --:--:-- 0:00:05 --:--:-- 5996k 100 32.7M 0 32.7M 0 0 6192k 0 --:--:-- 0:00:05 --:--:-- 5928k >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading k8s.io/apimachinery v0.28.1 go: downloading k8s.io/api v0.28.1 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading golang.org/x/crypto v0.14.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading github.com/spf13/viper v1.16.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading github.com/spf13/cobra v1.7.0 go: downloading k8s.io/client-go v0.28.1 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading k8s.io/kubectl v0.28.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading k8s.io/klog v1.0.0 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading golang.org/x/sync v0.3.0 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading google.golang.org/api v0.138.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/google/uuid v1.3.1 go: downloading github.com/imdario/mergo v0.3.15 go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/google/gofuzz v1.2.0 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading k8s.io/mount-utils v0.28.1 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading golang.org/x/sys v0.13.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading golang.org/x/term v0.13.0 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/kr/fs v0.1.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading golang.org/x/time v0.3.0 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading golang.org/x/text v0.13.0 go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading google.golang.org/protobuf v1.31.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/moby/locker v1.0.1 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading github.com/gorilla/mux v1.8.0 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/docker/go-metrics v0.0.1 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/morikuni/aec v1.0.0 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/google/s2a-go v0.1.5 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading google.golang.org/appengine v1.6.7 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/oklog/ulid v1.3.1 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0206 06:46:06.776296 61182 addon.go:250] addon test wants to update all nodes I0206 06:46:06.778376 61182 addon.go:250] addon test wants to update workers nodes I0206 06:46:06.778794 61182 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0206 06:46:06.779263 61182 addon.go:283] installing PKI for "test" I0206 06:46:07.004646 61182 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.84s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 0.911s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.071s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0206 06:46:09.643697 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:09.643943 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:09.644005 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:09.644056 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:09.644111 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:09.644172 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:09.644216 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:09.644233 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:09.644269 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:09.644302 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:09.650722 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.650780 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.734115 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:09.734313 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:09.734755 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:09.748278 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:09.748381 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:09.748416 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:09.748462 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:09.748507 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:09.748556 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:09.748598 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:09.748626 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:09.748663 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:09.748688 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:09.759676 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.759772 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.833924 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:09.834109 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:09.834424 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:09.843174 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:09.843286 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:09.843324 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:09.843372 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:09.843414 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:09.843466 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:09.843513 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:09.843545 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:09.843585 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:09.843614 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:09.848085 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.848139 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.883682 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:09.883889 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:09.884200 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:09.889828 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:09.889903 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:09.889930 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:09.890275 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:09.890303 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:09.890337 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:09.890363 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:09.890433 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:09.890462 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:09.890480 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:09.932175 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.932229 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:09.993747 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:09.993923 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:09.994227 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:09.999713 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:09.999784 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:09.999809 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:09.999840 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:09.999864 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:09.999894 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:09.999919 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:09.999937 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:09.999960 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:09.999976 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.003534 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.003611 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.031124 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.031299 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.031717 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:10.036865 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.036933 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.036959 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.036990 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.037015 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.037051 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.037078 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.037095 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.037121 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.037139 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.040961 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.041002 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.076163 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.076289 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.076579 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:10.082272 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.082377 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.082416 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.082461 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.082499 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.082552 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.082591 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.082623 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.082662 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.082687 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.086257 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.086298 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.108085 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.108260 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.108573 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.47s) === RUN TestCreateClusterHetzner I0206 06:46:10.114226 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.114329 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.114353 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.114380 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.114404 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.114435 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.114511 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.114528 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.114553 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.114570 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.120757 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.120814 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:10.164459 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:10.164522 62530 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0206 06:46:10.171355 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.171445 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.171474 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.171507 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.171541 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.171572 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.171598 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.171614 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.171637 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.171657 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.220438 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.220497 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.311847 62530 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.20s) === RUN TestCreateClusterOpenStack I0206 06:46:10.317413 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.317502 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.317529 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.317557 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.317580 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.317612 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.317666 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.317683 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.317706 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.317724 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.321291 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.321337 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:10.356123 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:10.356169 62530 new_cluster.go:1373] Cloud Provider ID: "openstack" I0206 06:46:10.358647 62530 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.05s) === RUN TestCreateClusterOpenStackOctavia I0206 06:46:10.368413 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.368504 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.368533 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.368566 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.368591 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.368621 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.368674 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.368690 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.368712 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.368729 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.372266 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.372308 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:10.406070 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:10.406119 62530 new_cluster.go:1373] Cloud Provider ID: "openstack" I0206 06:46:10.408608 62530 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0206 06:46:10.408633 62530 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.05s) === RUN TestCreateClusterOpenStackNoDNS I0206 06:46:10.416744 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.416831 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.416862 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.416892 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.416918 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.416948 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.417002 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.417022 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.417057 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.417077 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.421299 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.421359 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:10.465166 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:10.465212 62530 new_cluster.go:1373] Cloud Provider ID: "openstack" I0206 06:46:10.465261 62530 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0206 06:46:10.465278 62530 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.06s) === RUN TestCreateClusterCilium I0206 06:46:10.473245 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.473339 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.473366 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.473396 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.473420 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.473452 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.473504 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.473522 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.473547 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.473565 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.477213 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.477265 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.603620 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.603809 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.604156 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.14s) === RUN TestCreateClusterOverride I0206 06:46:10.609812 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.609895 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.609920 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.609949 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.609979 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.610009 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.610059 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.610077 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.610102 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.610118 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.613935 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.613974 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.637368 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.637837 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.638125 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.03s) === RUN TestCreateClusterKubernetesFeatureGates I0206 06:46:10.644095 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.644181 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.644209 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.644240 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.644265 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.644296 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.644348 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.644365 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.644392 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.644410 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.648516 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.648596 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.735688 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.735992 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:10.736669 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.10s) === RUN TestCreateClusterComplex I0206 06:46:10.748779 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.748915 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.748955 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.749005 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.749050 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.749102 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.749187 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.749225 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.749273 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.749308 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.753623 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.753687 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.849767 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.850107 62530 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0206 06:46:10.850126 62530 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0206 06:46:10.850140 62530 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0206 06:46:10.850586 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.11s) === RUN TestCreateClusterComplexPrivate I0206 06:46:10.862446 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.862536 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.862564 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.862600 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.862624 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.862656 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.862710 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.862731 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.862755 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.862773 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.868996 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.869056 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.904223 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:10.904833 62530 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0206 06:46:10.904865 62530 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0206 06:46:10.904888 62530 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0206 06:46:10.904905 62530 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0206 06:46:10.904918 62530 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0206 06:46:10.904930 62530 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0206 06:46:10.904942 62530 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0206 06:46:10.904956 62530 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0206 06:46:10.904970 62530 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0206 06:46:10.904983 62530 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0206 06:46:10.905539 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.06s) === RUN TestCreateClusterHA I0206 06:46:10.917529 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:10.917625 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:10.917653 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:10.917684 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:10.917709 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:10.917739 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:10.917792 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:10.917811 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:10.917834 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:10.917852 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:10.970088 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:10.970146 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.032574 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.033232 62530 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0206 06:46:11.033262 62530 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0206 06:46:11.033282 62530 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0206 06:46:11.033843 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:11.046102 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.046182 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.046208 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.046241 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.046265 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.046295 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.046321 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.046337 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.046360 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.046377 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.050270 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.050312 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.130848 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.131457 62530 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0206 06:46:11.131489 62530 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0206 06:46:11.131513 62530 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0206 06:46:11.132070 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.23s) === RUN TestCreateClusterMinimalGCE I0206 06:46:11.145061 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.145183 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.145223 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.145273 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.145311 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.145358 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.145441 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.145476 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.145519 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.145551 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.149407 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.149473 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.177095 62530 new_cluster.go:1373] Cloud Provider ID: "gce" I0206 06:46:11.177247 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0206 06:46:11.183040 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.183135 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.183171 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.183241 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.183279 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.183329 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.183366 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.183396 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.183438 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.183463 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.187078 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.187138 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.282668 62530 new_cluster.go:1373] Cloud Provider ID: "gce" I0206 06:46:11.282763 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.14s) === RUN TestCreateClusterHAGCE I0206 06:46:11.289300 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.289394 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.289422 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.289456 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.289481 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.289512 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.289566 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.289583 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.289605 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.289624 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.293291 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.293353 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.338513 62530 new_cluster.go:1373] Cloud Provider ID: "gce" I0206 06:46:11.338646 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.06s) === RUN TestCreateClusterGCE I0206 06:46:11.347461 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.347551 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.347579 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.347608 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.347631 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.347662 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.347716 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.347734 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.347756 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.347773 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.351551 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.351598 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.395848 62530 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0206 06:46:11.395925 62530 new_cluster.go:1373] Cloud Provider ID: "gce" I0206 06:46:11.396003 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.05s) === RUN TestCreateClusterHASharedZone I0206 06:46:11.401828 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.401914 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.401941 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.401970 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.401994 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.402026 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.402081 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.402098 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.402123 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.402141 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.406008 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.406054 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:11.431041 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:11.431086 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.431617 62530 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0206 06:46:11.432633 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.04s) === RUN TestCreateClusterHASharedZones I0206 06:46:11.441653 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.441748 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.441775 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.441814 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.441840 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.441872 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.441926 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.441943 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.441966 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.441984 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.445821 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.445872 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0206 06:46:11.467901 62530 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0206 06:46:11.467951 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.468332 62530 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0206 06:46:11.468352 62530 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0206 06:46:11.468726 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.04s) === RUN TestCreateClusterPrivate I0206 06:46:11.479157 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.479292 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.479359 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.479411 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.479453 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.479501 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.479580 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.479611 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.479649 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.479678 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.483891 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.483967 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.524960 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.525192 62530 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0206 06:46:11.525211 62530 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0206 06:46:11.525570 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:11.525610 62530 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.05s) === RUN TestCreateClusterPrivateGCE I0206 06:46:11.532630 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.532722 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.532748 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.532776 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.532802 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.532833 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.532886 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.532905 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.532928 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.532945 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.536785 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.536839 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.584648 62530 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0206 06:46:11.584732 62530 new_cluster.go:1373] Cloud Provider ID: "gce" I0206 06:46:11.584829 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.06s) === RUN TestCreateClusterWithNGWSpecified I0206 06:46:11.594156 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.594251 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.594278 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.594309 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.594332 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.594362 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.594412 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.594429 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.594450 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.594466 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.598400 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.598445 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.624007 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.624223 62530 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0206 06:46:11.624242 62530 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0206 06:46:11.624615 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:11.624647 62530 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.04s) === RUN TestCreateClusterWithINGWSpecified I0206 06:46:11.631403 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.631494 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.631519 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.631546 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.631569 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.631601 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.631657 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.631675 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.631696 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.631718 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.635664 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.635700 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.675433 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.675656 62530 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0206 06:46:11.675677 62530 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0206 06:46:11.676034 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:11.676065 62530 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.05s) === RUN TestCreateClusterSharedVPC I0206 06:46:11.682650 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.682732 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.682758 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.682786 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.682808 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.682839 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.682891 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.682909 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.682932 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.682948 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.686536 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.686584 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.721184 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.721386 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.721435 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.721468 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.721483 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.721528 62530 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0206 06:46:11.721866 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.05s) === RUN TestCreateClusterSharedSubnets I0206 06:46:11.727798 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.727884 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.727910 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.727936 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.727960 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.727991 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.728045 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.728062 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.728084 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.728105 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.731880 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.731949 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.776826 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.776873 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.776965 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.777134 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.777159 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.777184 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.777199 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.777561 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.06s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0206 06:46:11.783264 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.783348 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.783375 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.783402 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.783424 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.783456 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.783508 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.783526 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.783548 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.783564 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.790132 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.790190 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.823537 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:11.823594 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.823614 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.823701 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.823875 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.823898 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.823921 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.823935 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.824285 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.05s) === RUN TestCreateClusterPrivateSharedSubnets I0206 06:46:11.829909 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.829993 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.830018 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.830043 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.830066 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.830095 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.830146 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.830163 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.830201 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.830222 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.834077 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.834145 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.886456 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.886509 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.886561 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.886580 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.886645 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.886799 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.886821 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.886841 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:46:11.886855 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:46:11.887260 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.06s) === RUN TestCreateClusterIPv6 I0206 06:46:11.893524 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.893610 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.893635 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.893662 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.893686 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.893732 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.893787 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.893803 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.893826 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.893843 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.897827 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.897876 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.939203 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.939403 62530 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0206 06:46:11.939424 62530 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0206 06:46:11.939945 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.05s) === RUN TestCreateClusterDifferentAMIs I0206 06:46:11.946250 62530 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0206 06:46:11.946265 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.946340 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.946366 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.946394 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.946422 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.946453 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.946504 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.946523 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.946548 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.946565 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:11.950480 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.950518 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:11.984620 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:11.984741 62530 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0206 06:46:11.984771 62530 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0206 06:46:11.985293 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:11.996117 62530 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.05s) === RUN TestCreateClusterKarpenter I0206 06:46:11.996216 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:11.996298 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:11.996326 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:11.996369 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:11.996396 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:11.996430 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:11.996484 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:11.996513 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:11.996547 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:11.996565 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:12.001307 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:12.001362 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0206 06:46:12.072046 62530 new_cluster.go:1373] Cloud Provider ID: "aws" I0206 06:46:12.072226 62530 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0206 06:46:12.072245 62530 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0206 06:46:12.072258 62530 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0206 06:46:12.072649 62530 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.08s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0206 06:46:12.078949 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:12.079015 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:12.079041 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:12.079100 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:12.079126 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:12.079162 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:12.079188 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:12.079205 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:12.079228 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:12.079245 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:12.084559 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.01s) === RUN TestMinimal I0206 06:46:12.085743 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:12.085810 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:12.085829 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:12.085852 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:12.085872 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:12.085899 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:12.085943 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:12.085960 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:12.085981 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:12.085995 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:12.099812 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:46:12.101661 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:12.101716 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:46:17.327690 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:20.560966 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:46:20.567498 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:20.567531 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:20.567639 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:20.573915 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:46:20.580886 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:46:20.581619 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:20.582156 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:20.582746 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:20.583401 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:20.583497 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:46:20.583907 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:46:20.584426 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:46:20.589682 62530 target.go:111] Terraform output is in /tmp/test1531817870/out --- PASS: TestMinimal (8.51s) === RUN TestMinimal_v1_23 I0206 06:46:20.592919 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:20.593004 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:20.593034 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:20.593074 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:20.593100 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:20.593134 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:20.593190 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:20.593208 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:20.593231 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:20.593248 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:20.615196 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0206 06:46:20.619754 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:20.619887 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.705283 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:22.820997 62530 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0206 06:46:22.822203 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:22.822232 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:22.822291 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:22.823790 62530 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0206 06:46:22.827499 62530 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0206 06:46:22.827915 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.828081 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.828227 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.828704 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.828795 62530 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0206 06:46:22.829022 62530 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0206 06:46:22.829250 62530 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0206 06:46:22.833936 62530 target.go:111] Terraform output is in /tmp/test1085449399/out --- PASS: TestMinimal_v1_23 (2.24s) === RUN TestMinimal_v1_24 I0206 06:46:22.837632 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:22.837750 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:22.837792 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:22.837832 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:22.837868 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:22.837912 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:22.837990 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:22.838021 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:22.838056 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:22.838081 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:22.862918 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:46:22.865914 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:22.865996 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.648261 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:24.785721 62530 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0206 06:46:24.787875 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:24.787899 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:24.787977 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:24.789104 62530 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0206 06:46:24.795164 62530 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0206 06:46:24.795507 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.795695 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.795956 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.796175 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.796266 62530 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0206 06:46:24.796493 62530 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0206 06:46:24.796769 62530 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0206 06:46:24.801972 62530 target.go:111] Terraform output is in /tmp/test2883751783/out --- PASS: TestMinimal_v1_24 (1.97s) === RUN TestMinimal_v1_25 I0206 06:46:24.808275 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:24.808404 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:24.808445 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:24.808492 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:24.808534 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:24.808586 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:24.808667 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:24.808699 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:24.808739 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:24.808765 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:24.837215 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:46:24.840620 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:24.840710 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.690100 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:26.866584 62530 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0206 06:46:26.867771 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:26.867809 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:26.867902 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:26.870969 62530 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0206 06:46:26.876619 62530 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0206 06:46:26.876941 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.877085 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.877363 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.877590 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.877656 62530 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0206 06:46:26.877872 62530 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0206 06:46:26.878102 62530 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0206 06:46:26.881865 62530 target.go:111] Terraform output is in /tmp/test1756776302/out --- PASS: TestMinimal_v1_25 (2.08s) === RUN TestMinimal_v1_26 I0206 06:46:26.885001 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:26.885099 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:26.885133 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:26.885167 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:26.885193 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:26.885227 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:26.885294 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:26.885311 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:26.885342 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:26.885365 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:26.909508 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:46:26.912868 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:26.912955 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.785663 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:28.904923 62530 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0206 06:46:28.905532 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:28.905567 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:28.905657 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:28.907365 62530 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0206 06:46:28.910839 62530 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0206 06:46:28.911177 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.911346 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.911471 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.911945 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.912033 62530 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0206 06:46:28.912250 62530 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0206 06:46:28.912530 62530 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0206 06:46:28.917725 62530 target.go:111] Terraform output is in /tmp/test3632684755/out --- PASS: TestMinimal_v1_26 (2.04s) === RUN TestMinimal_v1_27 I0206 06:46:28.921867 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:28.921999 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:28.922043 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:28.922093 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:28.922135 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:28.922190 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:28.922283 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:28.922316 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:28.922358 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:28.922387 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:28.950231 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:46:28.952175 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:28.952240 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.784578 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:31.888818 62530 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0206 06:46:31.892614 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:31.892650 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:31.892698 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:31.894036 62530 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0206 06:46:31.898306 62530 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0206 06:46:31.898659 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.898847 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.899798 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.900525 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.900768 62530 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0206 06:46:31.901519 62530 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0206 06:46:31.903082 62530 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0206 06:46:31.906974 62530 target.go:111] Terraform output is in /tmp/test1247541321/out --- PASS: TestMinimal_v1_27 (2.99s) === RUN TestMinimal_NoneDNS I0206 06:46:31.911158 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:31.911295 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:31.911339 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:31.911441 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:31.911491 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:31.911552 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:31.911597 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:31.911636 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:31.911683 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:31.911716 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:46:31.951720 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:31.951820 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:33.327973 62530 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0206 06:46:33.331417 62530 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0206 06:46:33.335953 62530 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0206 06:46:33.336625 62530 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0206 06:46:33.336655 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:46:33.336712 62530 loadbalancers.go:35] PageSize not implemented I0206 06:46:33.336840 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:46:33.336888 62530 loadbalancers.go:35] PageSize not implemented I0206 06:46:33.339873 62530 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0206 06:46:33.340070 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:33.340239 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:33.340512 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:33.341094 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:33.341223 62530 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0206 06:46:33.341496 62530 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0206 06:46:33.341704 62530 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0206 06:46:33.347481 62530 target.go:111] Terraform output is in /tmp/test61985338/out --- PASS: TestMinimal_NoneDNS (1.44s) === RUN TestHetzner I0206 06:46:33.352032 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:46:35.399392 62530 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0206 06:46:35.403931 62530 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0206 06:46:35.405700 62530 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0206 06:46:35.411215 62530 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0206 06:46:35.412288 62530 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0206 06:46:35.414680 62530 target.go:111] Terraform output is in /tmp/test413758704/out --- PASS: TestHetzner (2.07s) === RUN TestNvidia I0206 06:46:35.417845 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:35.417982 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:35.418028 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:35.418115 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:35.418159 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:35.418208 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:35.418253 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:35.418283 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:35.418321 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:35.418349 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:35.441943 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:46:35.444572 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:35.444642 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.302900 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:37.435150 62530 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0206 06:46:37.436069 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:37.436115 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:37.436248 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:37.438792 62530 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0206 06:46:37.444704 62530 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0206 06:46:37.444926 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.445188 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.445654 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.445749 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.445846 62530 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0206 06:46:37.446153 62530 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0206 06:46:37.446527 62530 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0206 06:46:37.451768 62530 target.go:111] Terraform output is in /tmp/test2388238270/out --- PASS: TestNvidia (2.04s) === RUN TestMinimalGossip I0206 06:46:37.456397 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:37.456522 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:37.456563 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:37.456608 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:37.456648 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:37.456698 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:37.456778 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:37.456811 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:37.456859 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:37.456889 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:46:37.477209 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:37.477270 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.914267 62530 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0206 06:46:38.916390 62530 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0206 06:46:38.921376 62530 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0206 06:46:38.921650 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.921866 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.922105 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.922390 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.922500 62530 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0206 06:46:38.922751 62530 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0206 06:46:38.922933 62530 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0206 06:46:38.925592 62530 target.go:111] Terraform output is in /tmp/test3634737461/out --- PASS: TestMinimalGossip (1.47s) === RUN TestMinimalGossipIRSA I0206 06:46:38.927999 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:38.928114 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:38.928199 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:38.928271 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:38.928334 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:38.928404 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:38.928504 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:38.928557 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:38.928615 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:38.928680 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:46:38.949087 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:38.949154 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:40.326734 62530 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0206 06:46:40.330977 62530 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0206 06:46:40.338135 62530 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0206 06:46:40.338437 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:40.338542 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:40.338807 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:40.338878 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:40.338936 62530 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0206 06:46:40.339121 62530 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0206 06:46:40.339286 62530 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0206 06:46:40.350340 62530 target.go:111] Terraform output is in /tmp/test4009545225/out --- PASS: TestMinimalGossipIRSA (1.43s) === RUN TestMinimalGCE I0206 06:46:40.353668 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:40.354849 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:42.279184 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:42.279280 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:42.279384 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0206 06:46:42.279416 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0206 06:46:42.279443 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0206 06:46:42.279501 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:46:42.280398 62530 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0206 06:46:42.283567 62530 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0206 06:46:42.287637 62530 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0206 06:46:42.288452 62530 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0206 06:46:42.288636 62530 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0206 06:46:42.290215 62530 target.go:111] Terraform output is in /tmp/test2790426343/out --- PASS: TestMinimalGCE (1.94s) === RUN TestMinimalGCEPrivate I0206 06:46:42.291780 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:42.292627 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:43.947652 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:43.947774 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:43.947931 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0206 06:46:43.947967 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0206 06:46:43.947994 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0206 06:46:43.948062 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:46:43.949582 62530 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0206 06:46:43.954687 62530 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0206 06:46:43.959669 62530 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0206 06:46:43.960897 62530 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0206 06:46:43.961139 62530 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0206 06:46:43.963148 62530 target.go:111] Terraform output is in /tmp/test546822557/out --- PASS: TestMinimalGCEPrivate (1.67s) === RUN TestMinimalGCEInternalLoadBalancer I0206 06:46:43.965178 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:43.966245 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:45.582352 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:45.582409 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:45.582492 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0206 06:46:45.582514 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0206 06:46:45.582528 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0206 06:46:45.582569 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0206 06:46:45.582598 62530 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0206 06:46:45.583590 62530 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0206 06:46:45.585592 62530 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0206 06:46:45.585987 62530 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0206 06:46:45.586310 62530 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0206 06:46:45.589869 62530 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0206 06:46:45.591675 62530 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0206 06:46:45.592124 62530 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0206 06:46:45.592520 62530 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0206 06:46:45.593098 62530 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0206 06:46:45.595779 62530 target.go:111] Terraform output is in /tmp/test2947286680/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.64s) === RUN TestMinimalGCEPublicLoadBalancer I0206 06:46:45.607697 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:45.608780 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:47.249458 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:47.249534 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:47.249638 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0206 06:46:47.249667 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0206 06:46:47.249693 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0206 06:46:47.249751 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:46:47.250791 62530 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0206 06:46:47.255282 62530 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0206 06:46:47.258587 62530 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0206 06:46:47.259310 62530 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0206 06:46:47.259459 62530 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0206 06:46:47.262786 62530 target.go:111] Terraform output is in /tmp/test1895874784/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.66s) === RUN TestMinimalGCELongClusterName I0206 06:46:47.267303 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:47.269524 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:48.979654 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:48.979791 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:48.979962 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0206 06:46:48.980000 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0206 06:46:48.980031 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0206 06:46:48.980109 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:46:48.981772 62530 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0206 06:46:48.984248 62530 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0206 06:46:48.988108 62530 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0206 06:46:48.989024 62530 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0206 06:46:48.989161 62530 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0206 06:46:48.992696 62530 target.go:111] Terraform output is in /tmp/test4044891214/out --- PASS: TestMinimalGCELongClusterName (1.73s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0206 06:46:48.998767 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:49.001068 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:50.697226 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:50.697352 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:50.697514 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0206 06:46:50.697551 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0206 06:46:50.697578 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0206 06:46:50.697646 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0206 06:46:50.697697 62530 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0206 06:46:50.699212 62530 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0206 06:46:50.702262 62530 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0206 06:46:50.702943 62530 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0206 06:46:50.703167 62530 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0206 06:46:50.708609 62530 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0206 06:46:50.709638 62530 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0206 06:46:50.709837 62530 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0206 06:46:50.710010 62530 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0206 06:46:50.710164 62530 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0206 06:46:50.713728 62530 target.go:111] Terraform output is in /tmp/test4146398714/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.72s) === RUN TestMinimalGCEDNSNone I0206 06:46:50.717238 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:50.719003 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:52.390350 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:52.390440 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:52.390560 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0206 06:46:52.390932 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0206 06:46:52.390961 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0206 06:46:52.391025 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0206 06:46:52.391066 62530 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0206 06:46:52.392636 62530 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0206 06:46:52.395199 62530 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0206 06:46:52.395564 62530 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0206 06:46:52.395714 62530 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0206 06:46:52.398832 62530 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0206 06:46:52.399365 62530 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0206 06:46:52.399489 62530 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0206 06:46:52.399606 62530 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0206 06:46:52.399739 62530 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0206 06:46:52.401847 62530 target.go:111] Terraform output is in /tmp/test3989358819/out --- PASS: TestMinimalGCEDNSNone (1.69s) === RUN TestMinimalScaleway I0206 06:46:52.403714 62530 featureflag.go:164] FeatureFlag "Scaleway"=true I0206 06:46:52.403729 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:46:54.625944 62530 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0206 06:46:54.629177 62530 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0206 06:46:54.633586 62530 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0206 06:46:54.634862 62530 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0206 06:46:54.636667 62530 target.go:111] Terraform output is in /tmp/test2855487800/out I0206 06:46:54.639293 62530 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (2.24s) === RUN TestHA I0206 06:46:54.639402 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:54.639502 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:54.639539 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:54.639621 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:54.639654 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:54.639694 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:54.639727 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:54.639751 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:54.639786 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:54.639811 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:54.669954 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:46:54.673111 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:54.673185 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:54.673237 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:54.673287 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:55.942918 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:56.087501 62530 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0206 06:46:56.088158 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:56.088175 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:56.088235 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:56.091033 62530 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0206 06:46:56.096337 62530 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0206 06:46:56.096643 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.096783 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.096871 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.096998 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.097050 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.097186 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.097302 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.097671 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:56.097759 62530 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0206 06:46:56.098016 62530 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0206 06:46:56.098307 62530 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0206 06:46:56.104654 62530 target.go:111] Terraform output is in /tmp/test3075872405/out --- PASS: TestHA (1.47s) === RUN TestHighAvailabilityGCE I0206 06:46:56.109215 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:56.111054 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:46:57.743041 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:46:57.743155 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:46:57.743277 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0206 06:46:57.743307 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0206 06:46:57.743331 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0206 06:46:57.743383 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0206 06:46:57.743436 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0206 06:46:57.743479 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:46:57.744646 62530 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0206 06:46:57.746459 62530 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0206 06:46:57.753090 62530 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0206 06:46:57.753822 62530 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0206 06:46:57.754056 62530 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0206 06:46:57.756540 62530 target.go:111] Terraform output is in /tmp/test3688158855/out --- PASS: TestHighAvailabilityGCE (1.65s) === RUN TestComplex I0206 06:46:57.759113 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:57.759192 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:57.759218 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:57.759272 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:57.759297 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:57.759328 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:57.759353 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:57.759369 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:57.759391 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:57.759408 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:57.779102 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:46:57.781629 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:57.781692 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.657047 62530 zones.go:93] ListHostedZonesPages { } I0206 06:46:59.787518 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:46:59.788076 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:46:59.788105 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:46:59.788165 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:46:59.789762 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:46:59.791590 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:46:59.792078 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:46:59.792236 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:46:59.792279 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:46:59.792328 62530 loadbalancers.go:35] PageSize not implemented I0206 06:46:59.792372 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:46:59.792428 62530 loadbalancers.go:35] PageSize not implemented I0206 06:46:59.795575 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:46:59.795693 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.795845 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.796020 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.796306 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.796368 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:46:59.796564 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:46:59.796734 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:46:59.800594 62530 target.go:111] Terraform output is in /tmp/test285304181/out I0206 06:46:59.803543 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:59.803646 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:59.803691 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:59.803756 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:59.803797 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:59.803852 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:59.803896 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:59.803925 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:59.803963 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:59.803990 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:59.842567 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:46:59.845435 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:46:59.845507 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.120984 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:01.291323 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:47:01.291804 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:01.291844 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:01.291936 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:01.297997 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:47:01.299999 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:47:01.300525 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:47:01.300735 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:47:01.300782 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:01.300853 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:01.300958 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:01.301013 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:01.306530 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:47:01.306796 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.307014 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.307486 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.307614 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.307693 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:47:01.307929 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:47:01.308135 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:47:01.314268 62530 target.go:111] Terraform output is in /tmp/test3220324375/out --- PASS: TestComplex (3.56s) === RUN TestCompress I0206 06:47:01.318141 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:01.318271 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:01.318313 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:01.318364 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:01.318402 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:01.318446 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:01.318527 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:01.318554 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:01.318590 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:01.318615 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:01.340634 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:01.343535 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:01.343617 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.619967 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:02.777763 62530 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0206 06:47:02.778240 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:02.778258 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:02.779786 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:02.784498 62530 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0206 06:47:02.790314 62530 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0206 06:47:02.790556 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.790777 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.791674 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.792277 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.792404 62530 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0206 06:47:02.792668 62530 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0206 06:47:02.792974 62530 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0206 06:47:02.798517 62530 target.go:111] Terraform output is in /tmp/test123319046/out --- PASS: TestCompress (1.48s) === RUN TestExternalPolicies I0206 06:47:02.802947 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:02.803071 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:02.803112 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:02.803160 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:02.803202 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:02.803254 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:02.803343 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:02.803371 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:02.803409 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:02.803438 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:02.831992 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:02.835510 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:02.835590 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.114367 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:04.280017 62530 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0206 06:47:04.281857 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:04.281896 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:04.281991 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:04.287219 62530 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0206 06:47:04.289187 62530 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0206 06:47:04.289799 62530 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0206 06:47:04.289910 62530 api.go:53] PageSize not implemented W0206 06:47:04.289968 62530 api.go:53] PageSize not implemented I0206 06:47:04.295757 62530 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0206 06:47:04.295963 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.296254 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.296734 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.296820 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.296923 62530 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0206 06:47:04.297257 62530 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0206 06:47:04.297581 62530 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0206 06:47:04.302920 62530 target.go:111] Terraform output is in /tmp/test2283267488/out --- PASS: TestExternalPolicies (1.50s) === RUN TestMinimalIPv6 I0206 06:47:04.306779 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:04.306881 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:04.306918 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:04.307002 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:04.307050 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:04.307109 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:04.307148 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:04.307175 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:04.307212 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:04.307236 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:04.335328 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:04.338729 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:04.338809 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.601509 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:05.790565 62530 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0206 06:47:05.794758 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:05.794793 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:05.794885 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:05.796655 62530 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0206 06:47:05.800331 62530 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0206 06:47:05.801026 62530 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0206 06:47:05.801544 62530 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0206 06:47:05.801601 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:05.801673 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:05.801700 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:05.801769 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:05.807201 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:47:05.807383 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.807510 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.807903 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.808226 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.808339 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:47:05.808684 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:47:05.808986 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:47:05.815564 62530 target.go:111] Terraform output is in /tmp/test3944532813/out --- PASS: TestMinimalIPv6 (1.53s) === RUN TestMinimalIPv6Calico I0206 06:47:05.832828 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:05.832959 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:05.833002 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:05.833090 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:05.833135 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:05.833183 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:05.833225 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:05.833258 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:05.833296 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:05.833326 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:05.859001 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:05.861169 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:05.861230 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.125842 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:07.567351 62530 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0206 06:47:07.567846 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:07.567883 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:07.567976 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:07.570481 62530 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0206 06:47:07.573788 62530 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0206 06:47:07.574662 62530 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0206 06:47:07.575123 62530 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0206 06:47:07.575271 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:07.575359 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:07.575396 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:07.575507 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:07.580980 62530 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0206 06:47:07.581242 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.581515 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.581991 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.582084 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.582172 62530 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0206 06:47:07.582480 62530 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0206 06:47:07.582788 62530 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0206 06:47:07.590057 62530 target.go:111] Terraform output is in /tmp/test3933948947/out --- PASS: TestMinimalIPv6Calico (1.77s) === RUN TestMinimalIPv6Cilium I0206 06:47:07.600283 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:07.600446 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:07.600492 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:07.600583 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:07.600630 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:07.600681 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:07.600724 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:07.600753 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:07.600790 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:07.600815 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:07.630978 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:07.634956 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:07.635051 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:08.879085 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:09.098680 62530 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0206 06:47:09.099491 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:09.099526 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:09.099618 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:09.103058 62530 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0206 06:47:09.106299 62530 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0206 06:47:09.107159 62530 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0206 06:47:09.107659 62530 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0206 06:47:09.107790 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:09.107874 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:09.108041 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:09.108109 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:09.113380 62530 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0206 06:47:09.113540 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:09.113690 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:09.114249 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:09.114359 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:09.114521 62530 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0206 06:47:09.114868 62530 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0206 06:47:09.115210 62530 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0206 06:47:09.122039 62530 target.go:111] Terraform output is in /tmp/test2016593994/out --- PASS: TestMinimalIPv6Cilium (1.53s) === RUN TestMinimalIPv6NoSubnetPrefix I0206 06:47:09.126997 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:09.127137 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:09.127181 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:09.127272 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:09.127315 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:09.127368 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:09.127409 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:09.127437 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:09.127473 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:09.127502 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:09.157647 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:09.161294 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:09.161374 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.423240 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:10.611448 62530 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0206 06:47:10.612599 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:10.612661 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:10.612800 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:10.614484 62530 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0206 06:47:10.617887 62530 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0206 06:47:10.618876 62530 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0206 06:47:10.619355 62530 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0206 06:47:10.619478 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:10.619588 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:10.619710 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:47:10.619793 62530 loadbalancers.go:35] PageSize not implemented I0206 06:47:10.625294 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:47:10.625459 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.625753 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.626164 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.626239 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.626343 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:47:10.626650 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:47:10.626960 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:47:10.637861 62530 target.go:111] Terraform output is in /tmp/test1410291638/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.52s) === RUN TestMinimalWarmPool I0206 06:47:10.643460 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:10.643603 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:10.643648 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:10.643788 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:10.643845 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:10.643897 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:10.643939 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:10.643977 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:10.644021 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:10.644054 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:10.669677 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:10.673191 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:10.673281 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:11.934448 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:12.153079 62530 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0206 06:47:12.154025 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:12.154057 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:12.154156 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:12.156874 62530 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0206 06:47:12.161470 62530 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0206 06:47:12.161813 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:12.161994 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:12.162161 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:12.162621 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:12.162739 62530 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0206 06:47:12.163012 62530 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0206 06:47:12.163381 62530 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0206 06:47:12.168823 62530 target.go:111] Terraform output is in /tmp/test3558834676/out --- PASS: TestMinimalWarmPool (1.53s) === RUN TestMinimalEtcd I0206 06:47:12.173636 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:12.173796 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:12.173839 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:12.173885 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:12.173924 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:12.173976 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:12.174062 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:12.174093 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:12.174131 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:12.174159 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:12.200321 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:12.203683 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:12.203818 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.484236 62530 zones.go:93] ListHostedZonesPages { } W0206 06:47:13.650808 62530 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0206 06:47:13.650879 62530 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0206 06:47:13.653673 62530 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0206 06:47:13.667743 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:47:13.668690 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:13.668735 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:13.668873 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:13.670618 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:47:13.676428 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:47:13.676838 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.677078 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.677378 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.677822 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.677942 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:47:13.678267 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:47:13.678623 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:47:13.688847 62530 target.go:111] Terraform output is in /tmp/test721418779/out --- PASS: TestMinimalEtcd (1.52s) === RUN TestMinimalGp3 I0206 06:47:13.694261 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:13.694399 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:13.694442 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:13.694531 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:13.694578 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:13.694630 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:13.694677 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:13.694709 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:13.694747 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:13.694777 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:13.720086 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:13.723448 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:13.723541 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:14.994525 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:15.174767 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:47:15.175661 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:15.175698 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:15.175812 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:15.177526 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:47:15.188360 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:47:15.188818 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:15.189023 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:15.189530 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:15.189640 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:15.189764 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:47:15.190123 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:47:15.190662 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:47:15.196287 62530 target.go:111] Terraform output is in /tmp/test3557395122/out --- PASS: TestMinimalGp3 (1.51s) === RUN TestMinimalLongClusterName I0206 06:47:15.200848 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:15.200974 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:15.201015 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:15.201062 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:15.201101 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:15.201153 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:15.201240 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:15.201274 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:15.201315 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:15.201346 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:15.225767 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:15.228948 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:15.229032 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:47:16.486547 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:16.665479 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:47:16.666283 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:16.666325 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:16.666445 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:16.668201 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:47:16.674609 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:47:16.674950 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.675346 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.675678 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.675808 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.675932 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:47:16.676220 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:47:16.676577 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:47:16.682172 62530 target.go:111] Terraform output is in /tmp/test1253326496/out --- PASS: TestMinimalLongClusterName (1.49s) === RUN TestExistingSG I0206 06:47:16.686768 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:16.686900 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:16.686943 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:16.686991 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:16.687051 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:16.687107 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:16.687189 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:16.687218 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:16.687269 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:16.687298 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:16.725226 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:16.728975 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.729071 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.729135 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:16.729194 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.017841 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:18.210042 62530 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0206 06:47:18.212950 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:18.213005 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:18.213106 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:18.219009 62530 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0206 06:47:18.222785 62530 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0206 06:47:18.224011 62530 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0206 06:47:18.224085 62530 api.go:53] PageSize not implemented W0206 06:47:18.224177 62530 api.go:53] PageSize not implemented W0206 06:47:18.224321 62530 api.go:53] PageSize not implemented W0206 06:47:18.224465 62530 api.go:53] PageSize not implemented I0206 06:47:18.230069 62530 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0206 06:47:18.230247 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.230527 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.230815 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.231131 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.231395 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.231536 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.231640 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.231914 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.232027 62530 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0206 06:47:18.232454 62530 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0206 06:47:18.232958 62530 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0206 06:47:18.241315 62530 target.go:111] Terraform output is in /tmp/test4293882118/out --- PASS: TestExistingSG (1.56s) === RUN TestBastionAdditionalUserData I0206 06:47:18.247093 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:18.247229 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:18.247271 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:18.247318 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:18.247362 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:18.247414 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:18.247496 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:18.247524 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:18.247564 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:18.247592 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:18.282527 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:18.286060 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.286156 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:18.286219 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.546902 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:19.731071 62530 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0206 06:47:19.731638 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:19.731673 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:19.731775 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:19.734837 62530 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0206 06:47:19.738482 62530 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0206 06:47:19.739289 62530 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0206 06:47:19.739443 62530 api.go:53] PageSize not implemented W0206 06:47:19.739479 62530 api.go:53] PageSize not implemented W0206 06:47:19.739564 62530 api.go:53] PageSize not implemented I0206 06:47:19.745173 62530 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0206 06:47:19.745427 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.745642 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.745893 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.745984 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.746187 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.746701 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.746807 62530 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0206 06:47:19.747232 62530 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0206 06:47:19.747589 62530 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0206 06:47:19.759683 62530 target.go:111] Terraform output is in /tmp/test1986293762/out --- PASS: TestBastionAdditionalUserData (1.52s) === RUN TestPrivateFlannel I0206 06:47:19.765348 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:19.765552 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:19.765598 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:19.765693 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:19.765742 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:19.765792 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:19.765838 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:19.765872 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:19.765914 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:19.765944 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:19.794375 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:19.797571 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.797647 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:19.797697 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.035355 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:21.234875 62530 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0206 06:47:21.235696 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:21.235726 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:21.235827 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:21.238205 62530 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0206 06:47:21.241600 62530 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0206 06:47:21.241830 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.241973 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.242508 62530 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0206 06:47:21.242679 62530 api.go:53] PageSize not implemented W0206 06:47:21.242731 62530 api.go:53] PageSize not implemented I0206 06:47:21.248357 62530 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0206 06:47:21.248616 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.248869 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.249377 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.249477 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.249557 62530 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0206 06:47:21.249932 62530 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0206 06:47:21.250192 62530 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0206 06:47:21.257164 62530 target.go:111] Terraform output is in /tmp/test1559444658/out --- PASS: TestPrivateFlannel (1.50s) === RUN TestPrivateCalico I0206 06:47:21.262241 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:21.262376 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:21.262418 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:21.262507 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:21.262549 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:21.262603 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:21.262646 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:21.262678 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:21.262716 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:21.262745 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:21.292073 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:21.295476 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.295559 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:21.295614 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:22.557266 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:23.007496 62530 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0206 06:47:23.008119 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:23.008168 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:23.008317 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:23.010569 62530 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0206 06:47:23.013967 62530 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0206 06:47:23.014776 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.014978 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.015125 62530 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0206 06:47:23.015190 62530 api.go:53] PageSize not implemented W0206 06:47:23.015407 62530 api.go:53] PageSize not implemented I0206 06:47:23.021417 62530 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0206 06:47:23.021613 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.021719 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.022046 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.022421 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.022533 62530 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0206 06:47:23.022839 62530 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0206 06:47:23.023177 62530 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0206 06:47:23.030474 62530 target.go:111] Terraform output is in /tmp/test2698656228/out --- PASS: TestPrivateCalico (1.78s) === RUN TestPrivateCilium I0206 06:47:23.043314 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:23.043459 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:23.043505 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:23.043553 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:23.043593 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:23.043647 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:23.043772 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:23.043804 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:23.043843 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:23.043875 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:23.078697 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:23.082568 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.082664 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:23.082723 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.328696 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:24.547261 62530 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0206 06:47:24.548037 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:24.548090 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:24.548202 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:24.550320 62530 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0206 06:47:24.553748 62530 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0206 06:47:24.554288 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.554510 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.554624 62530 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0206 06:47:24.554773 62530 api.go:53] PageSize not implemented W0206 06:47:24.554811 62530 api.go:53] PageSize not implemented I0206 06:47:24.560276 62530 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0206 06:47:24.560577 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.560764 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.561026 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.561462 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.561568 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:47:24.561857 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:47:24.562164 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:47:24.568933 62530 target.go:111] Terraform output is in /tmp/test3868440682/out --- PASS: TestPrivateCilium (1.53s) === RUN TestPrivateCilium2 I0206 06:47:24.573866 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:24.573987 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:24.574028 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:24.574117 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:24.574164 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:24.574214 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:24.574254 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:24.574282 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:24.574319 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:24.574350 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:24.609046 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:47:24.612872 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.612966 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:24.613027 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:25.864851 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:26.555374 62530 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0206 06:47:26.555990 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:26.556035 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:26.556132 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:26.564002 62530 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0206 06:47:26.567279 62530 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0206 06:47:26.567787 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.567979 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.568174 62530 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0206 06:47:26.568377 62530 api.go:53] PageSize not implemented W0206 06:47:26.568449 62530 api.go:53] PageSize not implemented I0206 06:47:26.573724 62530 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0206 06:47:26.573894 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.574075 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.574364 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.574869 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.574998 62530 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0206 06:47:26.575357 62530 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0206 06:47:26.575724 62530 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0206 06:47:26.583377 62530 target.go:111] Terraform output is in /tmp/test461226234/out --- PASS: TestPrivateCilium2 (2.02s) === RUN TestPrivateCiliumAdvanced I0206 06:47:26.591893 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:26.592025 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:26.592068 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:26.592115 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:26.592158 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:26.592210 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:26.592296 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:26.592326 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:26.592364 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:26.592393 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:26.632767 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:26.636606 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.636704 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:26.636767 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:27.935547 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:28.176652 62530 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0206 06:47:28.177597 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:28.177640 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:28.177743 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:28.180630 62530 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0206 06:47:28.184657 62530 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0206 06:47:28.185255 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.185508 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.185627 62530 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0206 06:47:28.185697 62530 api.go:53] PageSize not implemented W0206 06:47:28.185827 62530 api.go:53] PageSize not implemented I0206 06:47:28.192296 62530 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0206 06:47:28.192473 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.192701 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.193163 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.193260 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.193361 62530 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0206 06:47:28.193694 62530 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0206 06:47:28.194073 62530 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0206 06:47:28.209357 62530 target.go:111] Terraform output is in /tmp/test1616674109/out --- PASS: TestPrivateCiliumAdvanced (1.62s) === RUN TestPrivateCiliumENI I0206 06:47:28.214801 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:28.214928 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:28.214972 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:28.215025 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:28.215068 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:28.215121 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:28.215202 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:28.215230 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:28.215268 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:28.215295 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:28.248224 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:28.251857 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.251953 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:28.252013 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.573087 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:29.793362 62530 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0206 06:47:29.794659 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:29.794708 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:29.794837 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:29.797183 62530 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0206 06:47:29.800491 62530 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0206 06:47:29.801168 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.801328 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.801424 62530 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0206 06:47:29.801506 62530 api.go:53] PageSize not implemented W0206 06:47:29.801639 62530 api.go:53] PageSize not implemented I0206 06:47:29.807192 62530 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0206 06:47:29.807379 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.807630 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.807887 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.808368 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.808479 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:47:29.808768 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:47:29.809090 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:47:29.815801 62530 target.go:111] Terraform output is in /tmp/test1793358901/out --- PASS: TestPrivateCiliumENI (1.61s) === RUN TestPrivateCanal I0206 06:47:29.820913 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:29.821061 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:29.821106 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:29.821204 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:29.821262 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:29.821336 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:29.821385 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:29.821435 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:29.821496 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:29.821532 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:29.854490 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:47:29.857938 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.858039 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:29.858099 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.150300 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:31.589617 62530 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0206 06:47:31.590181 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:31.590230 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:31.590332 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:31.593388 62530 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0206 06:47:31.596809 62530 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0206 06:47:31.597245 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.597465 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.597675 62530 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0206 06:47:31.597876 62530 api.go:53] PageSize not implemented W0206 06:47:31.597950 62530 api.go:53] PageSize not implemented I0206 06:47:31.603682 62530 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0206 06:47:31.603882 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.604120 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.604341 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.604828 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.604945 62530 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0206 06:47:31.605247 62530 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0206 06:47:31.605622 62530 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0206 06:47:31.613168 62530 target.go:111] Terraform output is in /tmp/test1188304203/out --- PASS: TestPrivateCanal (1.80s) === RUN TestPrivateKopeio I0206 06:47:31.623486 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:31.623627 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:31.623671 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:31.623764 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:31.623830 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:31.623885 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:31.623970 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:31.624000 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:31.624038 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:31.624065 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:31.654590 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:31.658152 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.658238 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:31.658302 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.019186 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:33.205657 62530 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0206 06:47:33.211780 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:33.211834 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:33.211973 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:33.214253 62530 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0206 06:47:33.218144 62530 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0206 06:47:33.218858 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.219030 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.219139 62530 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0206 06:47:33.219396 62530 api.go:53] PageSize not implemented W0206 06:47:33.219525 62530 api.go:53] PageSize not implemented I0206 06:47:33.225017 62530 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0206 06:47:33.225203 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.225498 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.225736 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.226311 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.226431 62530 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0206 06:47:33.226738 62530 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0206 06:47:33.227073 62530 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0206 06:47:33.234267 62530 target.go:111] Terraform output is in /tmp/test3071786104/out --- PASS: TestPrivateKopeio (1.63s) === RUN TestUnmanaged I0206 06:47:33.251291 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:33.251419 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:33.251464 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:33.251513 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:33.251556 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:33.251608 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:33.251690 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:33.251722 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:33.251759 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:33.251790 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:33.283636 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:33.288280 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.288374 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:33.288434 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.552829 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:34.741778 62530 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0206 06:47:34.743026 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:34.743077 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:34.743245 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:34.745346 62530 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0206 06:47:34.748588 62530 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0206 06:47:34.749448 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.749628 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.749774 62530 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0206 06:47:34.749842 62530 api.go:53] PageSize not implemented W0206 06:47:34.749994 62530 api.go:53] PageSize not implemented I0206 06:47:34.755975 62530 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0206 06:47:34.756155 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.756318 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.756638 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.757107 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.757213 62530 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0206 06:47:34.757505 62530 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0206 06:47:34.757876 62530 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0206 06:47:34.764479 62530 target.go:111] Terraform output is in /tmp/test1738616313/out --- PASS: TestUnmanaged (1.52s) === RUN TestPrivateSharedSubnet I0206 06:47:34.773906 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:34.774071 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:34.774114 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:34.774171 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:34.774219 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:34.774274 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:34.774363 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:34.774393 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:34.774433 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:34.774460 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:34.802878 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:34.806383 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.806471 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:34.806534 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.094758 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:36.277499 62530 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0206 06:47:36.278328 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:36.278354 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:36.278430 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:36.281098 62530 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0206 06:47:36.281449 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:47:36.284510 62530 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0206 06:47:36.284950 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.285163 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.286298 62530 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0206 06:47:36.286404 62530 api.go:53] PageSize not implemented W0206 06:47:36.286588 62530 api.go:53] PageSize not implemented I0206 06:47:36.295038 62530 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0206 06:47:36.295304 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.295538 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.295823 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.296349 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.296461 62530 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0206 06:47:36.296729 62530 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0206 06:47:36.297138 62530 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0206 06:47:36.303473 62530 target.go:111] Terraform output is in /tmp/test2600493574/out --- PASS: TestPrivateSharedSubnet (1.53s) === RUN TestPrivateSharedIP I0206 06:47:36.308401 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:36.308531 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:36.308575 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:36.308624 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:36.308666 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:36.308718 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:36.308801 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:36.308830 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:36.308867 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:36.308895 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:36.337216 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:36.340680 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.340763 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:36.340849 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.619530 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:37.800114 62530 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0206 06:47:37.801342 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:37.801374 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:37.801476 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:37.804118 62530 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0206 06:47:37.804737 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:47:37.807436 62530 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0206 06:47:37.807912 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.808036 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.808286 62530 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0206 06:47:37.808444 62530 api.go:53] PageSize not implemented W0206 06:47:37.808485 62530 api.go:53] PageSize not implemented I0206 06:47:37.814018 62530 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0206 06:47:37.814183 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.814401 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.814997 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.815230 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.815347 62530 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0206 06:47:37.815706 62530 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0206 06:47:37.816098 62530 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0206 06:47:37.822662 62530 target.go:111] Terraform output is in /tmp/test3640507751/out --- PASS: TestPrivateSharedIP (1.52s) === RUN TestPrivateDns1 I0206 06:47:37.827485 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:37.827619 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:37.827660 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:37.827708 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:37.827748 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:37.827800 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:37.827885 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:37.827915 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:37.827952 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:37.827980 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:47:37.859523 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.859607 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:37.859662 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.402164 62530 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0206 06:47:39.405309 62530 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0206 06:47:39.405685 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0206 06:47:39.405733 62530 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0206 06:47:39.405824 62530 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0206 06:47:39.405851 62530 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0206 06:47:39.406034 62530 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0206 06:47:39.406479 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.406648 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.409545 62530 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0206 06:47:39.409676 62530 api.go:53] PageSize not implemented W0206 06:47:39.409790 62530 api.go:53] PageSize not implemented I0206 06:47:39.415304 62530 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0206 06:47:39.415479 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.415702 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.415958 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.416378 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.416480 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:47:39.416781 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:47:39.417134 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:47:39.429607 62530 target.go:111] Terraform output is in /tmp/test3776822660/out --- PASS: TestPrivateDns1 (1.61s) === RUN TestPrivateDns2 I0206 06:47:39.435028 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:39.435158 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:39.435200 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:39.435285 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:39.435326 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:39.435375 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:39.435417 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:39.435449 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:39.435486 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:39.435517 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:39.466528 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.466606 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:39.466662 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.911527 62530 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0206 06:47:40.918723 62530 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0206 06:47:40.918946 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0206 06:47:40.918993 62530 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0206 06:47:40.919114 62530 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0206 06:47:40.919150 62530 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0206 06:47:40.919164 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:47:40.919699 62530 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0206 06:47:40.920570 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.920786 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.923646 62530 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0206 06:47:40.923779 62530 api.go:53] PageSize not implemented W0206 06:47:40.924003 62530 api.go:53] PageSize not implemented I0206 06:47:40.930357 62530 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0206 06:47:40.930580 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.930805 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.931280 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.931366 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.931453 62530 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0206 06:47:40.931783 62530 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0206 06:47:40.932148 62530 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0206 06:47:40.938775 62530 target.go:111] Terraform output is in /tmp/test280113688/out --- PASS: TestPrivateDns2 (1.51s) === RUN TestDiscoveryFeatureGate I0206 06:47:40.943467 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:40.943594 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:40.943636 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:40.943740 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:40.943790 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:40.943842 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:40.943885 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:40.943914 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:40.943956 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:40.943985 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:40.969689 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:47:40.973046 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:40.973131 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.274672 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:42.490463 62530 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0206 06:47:42.490914 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:42.490962 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:42.491062 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:42.493691 62530 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0206 06:47:42.501321 62530 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0206 06:47:42.501844 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.502054 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.502367 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.502829 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.502952 62530 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0206 06:47:42.503269 62530 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0206 06:47:42.503613 62530 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0206 06:47:42.512982 62530 target.go:111] Terraform output is in /tmp/test1379360527/out --- PASS: TestDiscoveryFeatureGate (1.57s) === RUN TestVFSServiceAccountIssuerDiscovery I0206 06:47:42.518174 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:42.518299 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:42.518343 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:42.518391 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:42.518435 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:42.518492 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:42.518577 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:42.518606 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:42.518644 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:42.518673 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:42.543630 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:42.546868 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:42.546956 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:43.860068 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:44.040025 62530 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0206 06:47:44.041134 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:44.041182 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:44.041278 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:44.044333 62530 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0206 06:47:44.051172 62530 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0206 06:47:44.051512 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:44.051691 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:44.052033 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:44.052463 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:44.052588 62530 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0206 06:47:44.052942 62530 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0206 06:47:44.053289 62530 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0206 06:47:44.058660 62530 target.go:111] Terraform output is in /tmp/test47191058/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.55s) === RUN TestAWSLBController I0206 06:47:44.063374 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:44.063499 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:44.063540 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:44.063584 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:44.063625 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:44.063675 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:44.063779 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:44.063810 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:44.063852 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:44.063881 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:44.093924 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:44.097628 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:44.097726 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:45.382103 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:46.129220 62530 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0206 06:47:46.130643 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:46.130689 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:46.130779 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:46.133105 62530 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0206 06:47:46.139526 62530 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0206 06:47:46.140047 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:46.140258 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:46.140732 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:46.140876 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:46.141000 62530 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0206 06:47:46.141288 62530 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0206 06:47:46.142042 62530 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0206 06:47:46.149306 62530 target.go:111] Terraform output is in /tmp/test14296105/out --- PASS: TestAWSLBController (2.10s) === RUN TestManyAddons I0206 06:47:46.162371 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:46.162510 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:46.162554 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:46.162602 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:46.162643 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:46.162697 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:46.162777 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:46.162807 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:46.162845 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:46.162876 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:46.190541 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:46.194111 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:46.194202 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:47.490176 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:48.333560 62530 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0206 06:47:48.339114 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:48.339170 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:48.339304 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:48.344507 62530 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0206 06:47:48.350877 62530 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0206 06:47:48.351387 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:48.351640 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:48.352130 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:48.352225 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:48.352330 62530 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0206 06:47:48.352700 62530 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0206 06:47:48.353124 62530 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0206 06:47:48.359521 62530 target.go:111] Terraform output is in /tmp/test3375262624/out --- PASS: TestManyAddons (2.21s) === RUN TestManyAddonsCCMIRSA I0206 06:47:48.373190 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:48.373432 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:48.373506 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:48.373572 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:48.373619 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:48.373672 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:48.373831 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:48.373879 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:48.373936 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:48.373976 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:48.402556 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:47:48.406076 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:48.406162 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:49.666496 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:50.578797 62530 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0206 06:47:50.579910 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:50.579955 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:50.580050 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:50.582978 62530 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0206 06:47:50.589878 62530 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0206 06:47:50.590118 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:50.590484 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:50.590601 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:50.591274 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:50.591393 62530 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0206 06:47:50.591695 62530 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0206 06:47:50.592086 62530 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0206 06:47:50.604193 62530 target.go:111] Terraform output is in /tmp/test59773726/out --- PASS: TestManyAddonsCCMIRSA (2.24s) === RUN TestManyAddonsCCMIRSA23 I0206 06:47:50.614514 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:50.614647 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:50.614696 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:50.614789 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:50.614839 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:50.614892 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:50.614939 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:50.614970 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:50.615012 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:50.615040 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:50.642419 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0206 06:47:50.646122 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:50.646208 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:51.667932 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:52.589896 62530 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0206 06:47:52.590576 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:52.590601 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:52.590662 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:52.598335 62530 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0206 06:47:52.609353 62530 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0206 06:47:52.609838 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:52.610053 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:52.610427 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:52.610858 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:52.610971 62530 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0206 06:47:52.611292 62530 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0206 06:47:52.611703 62530 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0206 06:47:52.619536 62530 target.go:111] Terraform output is in /tmp/test229218271/out --- PASS: TestManyAddonsCCMIRSA23 (2.01s) === RUN TestManyAddonsCCMIRSA24 I0206 06:47:52.629251 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:52.629384 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:52.629429 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:52.629527 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:52.629572 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:52.629621 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:52.629663 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:52.629694 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:52.629731 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:52.629762 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:52.662257 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:47:52.665908 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:52.666008 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:53.996843 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:54.902115 62530 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0206 06:47:54.903765 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:54.903810 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:54.903898 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:54.906685 62530 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0206 06:47:54.913050 62530 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0206 06:47:54.913643 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:54.913901 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:54.914337 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:54.914423 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:54.914521 62530 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0206 06:47:54.914842 62530 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0206 06:47:54.915195 62530 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0206 06:47:54.923056 62530 target.go:111] Terraform output is in /tmp/test3411006696/out --- PASS: TestManyAddonsCCMIRSA24 (2.31s) === RUN TestManyAddonsCCMIRSA25 I0206 06:47:54.936569 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:54.936716 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:54.936760 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:54.936848 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:54.936893 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:54.936945 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:54.936990 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:54.937018 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:54.937077 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:54.937107 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:54.966786 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:47:54.970476 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:54.970574 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:56.253884 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:57.175889 62530 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0206 06:47:57.176909 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:57.176962 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:57.177123 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:57.185474 62530 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0206 06:47:57.192373 62530 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0206 06:47:57.192811 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:57.193148 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:57.193622 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:57.193770 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:57.193881 62530 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0206 06:47:57.194293 62530 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0206 06:47:57.194589 62530 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0206 06:47:57.202555 62530 target.go:111] Terraform output is in /tmp/test4115416203/out --- PASS: TestManyAddonsCCMIRSA25 (2.28s) === RUN TestManyAddonsCCMIRSA26 I0206 06:47:57.218089 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:47:57.218293 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:47:57.218350 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:47:57.218455 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:47:57.218501 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:47:57.218557 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:47:57.218604 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:47:57.218635 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:47:57.218673 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:47:57.218702 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:47:57.247773 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:47:57.251470 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:57.251559 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:58.532955 62530 zones.go:93] ListHostedZonesPages { } I0206 06:47:59.473649 62530 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0206 06:47:59.475425 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:47:59.475461 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:47:59.475535 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:47:59.478131 62530 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0206 06:47:59.487877 62530 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0206 06:47:59.488278 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:59.488810 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:59.489493 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:59.490234 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:47:59.490346 62530 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0206 06:47:59.490652 62530 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0206 06:47:59.490971 62530 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0206 06:47:59.499245 62530 target.go:111] Terraform output is in /tmp/test3508577163/out --- PASS: TestManyAddonsCCMIRSA26 (2.29s) === RUN TestManyAddonsGCE I0206 06:47:59.509911 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:01.705737 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:48:01.705808 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:48:01.705883 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0206 06:48:01.705904 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0206 06:48:01.705919 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0206 06:48:01.705966 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:48:01.706911 62530 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0206 06:48:01.714406 62530 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0206 06:48:01.720742 62530 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0206 06:48:01.722251 62530 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0206 06:48:01.722456 62530 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0206 06:48:01.726704 62530 target.go:111] Terraform output is in /tmp/test3842948914/out --- PASS: TestManyAddonsGCE (2.22s) === RUN TestCCM I0206 06:48:01.734358 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:01.734493 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:01.734542 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:01.734637 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:01.734682 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:01.734734 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:01.734776 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:01.734805 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:01.734846 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:01.734876 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:01.762242 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:01.765702 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:01.765788 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.059601 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:03.905469 62530 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0206 06:48:03.906124 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:03.906168 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:03.906272 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:03.910770 62530 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0206 06:48:03.916557 62530 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0206 06:48:03.917188 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.917412 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.917870 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.917945 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.918048 62530 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0206 06:48:03.918343 62530 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0206 06:48:03.918716 62530 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0206 06:48:03.925354 62530 target.go:111] Terraform output is in /tmp/test684796693/out --- PASS: TestCCM (2.20s) === RUN TestExternalDNS I0206 06:48:03.938316 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:03.938455 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:03.938499 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:03.938547 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:03.938587 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:03.938639 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:03.938724 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:03.938753 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:03.938791 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:03.938820 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:03.965337 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:03.968557 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:03.968645 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.238289 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:05.429160 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:05.429911 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:05.429971 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:05.430130 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:05.432695 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:05.438797 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:05.439307 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.439552 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.439742 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.440276 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.440412 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:05.440736 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:05.441092 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:05.446893 62530 target.go:111] Terraform output is in /tmp/test2816150337/out --- PASS: TestExternalDNS (1.52s) === RUN TestExternalDNSIRSA I0206 06:48:05.454413 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:05.454639 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:05.454720 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:05.454795 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:05.454843 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:05.454895 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:05.454982 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:05.455013 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:05.455051 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:05.455080 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:05.480986 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:05.484266 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:05.484362 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:06.753804 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:06.974240 62530 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0206 06:48:06.974573 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:06.974624 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:06.974722 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:06.978518 62530 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0206 06:48:06.988439 62530 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0206 06:48:06.988670 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:06.989330 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:06.989485 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:06.990511 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:06.990648 62530 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0206 06:48:06.991022 62530 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0206 06:48:06.991330 62530 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0206 06:48:06.997599 62530 target.go:111] Terraform output is in /tmp/test2039876024/out --- PASS: TestExternalDNSIRSA (1.55s) === RUN TestKarpenter I0206 06:48:07.003177 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:07.003305 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:07.003346 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:07.003432 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:07.003477 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:07.003529 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:07.003575 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:07.003606 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:07.003648 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:07.003677 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:07.035714 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:48:07.039067 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:07.039135 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:07.039186 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.296357 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:08.502017 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.502128 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.502219 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0206 06:48:08.648401 62530 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0206 06:48:08.648480 62530 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0206 06:48:08.648499 62530 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0206 06:48:08.648514 62530 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0206 06:48:08.648527 62530 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0206 06:48:08.669969 62530 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0206 06:48:08.670842 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:08.670887 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:08.670998 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:08.678741 62530 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0206 06:48:08.685158 62530 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0206 06:48:08.685428 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.685843 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686089 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686376 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686602 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686686 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686857 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.686951 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.687060 62530 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0206 06:48:08.687454 62530 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0206 06:48:08.687794 62530 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0206 06:48:08.695246 62530 target.go:111] Terraform output is in /tmp/test3374295793/out --- PASS: TestKarpenter (1.70s) === RUN TestSharedSubnet I0206 06:48:08.702208 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:08.702338 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:08.702380 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:08.702424 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:08.702463 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:08.702514 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:08.702602 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:08.702633 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:08.702675 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:08.702708 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:08.734046 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:08.737220 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:08.737312 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:09.998388 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:10.187768 62530 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0206 06:48:10.188403 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:10.188433 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:10.188527 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:10.191412 62530 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0206 06:48:10.191694 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:10.200901 62530 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0206 06:48:10.201286 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:10.202168 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:10.202325 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:10.202685 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:10.202805 62530 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0206 06:48:10.203086 62530 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0206 06:48:10.203436 62530 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0206 06:48:10.208471 62530 target.go:111] Terraform output is in /tmp/test2688950154/out --- PASS: TestSharedSubnet (1.51s) === RUN TestSharedVPC I0206 06:48:10.213022 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:10.213148 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:10.213188 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:10.213233 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:10.213277 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:10.213328 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:10.213410 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:10.213439 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:10.213479 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:10.213508 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:10.236129 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:10.238597 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:10.238662 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.495861 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:11.682059 62530 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0206 06:48:11.686196 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:11.686262 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:11.686428 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:11.689746 62530 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0206 06:48:11.690279 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:11.696255 62530 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0206 06:48:11.696713 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.696878 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.697248 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.697633 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.697755 62530 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0206 06:48:11.698062 62530 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0206 06:48:11.698482 62530 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0206 06:48:11.703598 62530 target.go:111] Terraform output is in /tmp/test239844793/out --- PASS: TestSharedVPC (1.50s) === RUN TestSharedVPCIPv6 I0206 06:48:11.708214 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:11.708335 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:11.708377 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:11.708462 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:11.708507 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:11.708560 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:11.708604 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:11.708633 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:11.708670 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:11.708699 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:11.710790 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:48:11.710847 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:11.738825 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:48:11.738878 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:11.738982 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:48:11.742853 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:11.742936 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.058038 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:13.259861 62530 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0206 06:48:13.260852 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:13.260903 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:13.261044 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:13.264199 62530 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0206 06:48:13.264577 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:13.265047 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:48:13.267794 62530 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0206 06:48:13.268615 62530 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0206 06:48:13.268846 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:13.268928 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:13.269065 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:13.269158 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:13.278627 62530 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0206 06:48:13.278834 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.279071 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.279283 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.279831 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.279949 62530 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0206 06:48:13.280282 62530 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0206 06:48:13.280658 62530 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0206 06:48:13.287333 62530 target.go:111] Terraform output is in /tmp/test2038249789/out --- PASS: TestSharedVPCIPv6 (1.59s) === RUN TestExistingIAM I0206 06:48:13.300741 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:13.300872 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:13.300915 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:13.300961 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:13.301001 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:13.301051 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:13.301137 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:13.301186 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:13.301225 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:13.301254 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:13.332905 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:13.335922 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.335997 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.336045 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:13.336091 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.630313 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:14.810177 62530 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0206 06:48:14.810591 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:14.810653 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:14.810752 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:14.813713 62530 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0206 06:48:14.823586 62530 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0206 06:48:14.824150 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.824406 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.824653 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.824935 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.825030 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.825136 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.825717 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.826204 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.826335 62530 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0206 06:48:14.826682 62530 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0206 06:48:14.827062 62530 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0206 06:48:14.834332 62530 target.go:111] Terraform output is in /tmp/test2693121387/out --- PASS: TestExistingIAM (1.54s) === RUN TestPhaseNetwork I0206 06:48:14.839556 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:14.839680 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:14.839722 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:14.839771 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:14.839817 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:14.839870 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:14.839913 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:14.839942 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:14.839980 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:14.840007 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:14.867780 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:14.870934 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.871007 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:14.871061 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:16.212335 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:16.403571 62530 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0206 06:48:16.404375 62530 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0206 06:48:16.404870 62530 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0206 06:48:16.405631 62530 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0206 06:48:16.405865 62530 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0206 06:48:16.406051 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:48:16.406105 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:48:16.406153 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:48:16.407170 62530 target.go:111] Terraform output is in /tmp/test4208538359/out --- PASS: TestPhaseNetwork (1.57s) === RUN TestExternalLoadBalancer I0206 06:48:16.407759 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:16.407890 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:16.407937 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:16.408025 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:16.408069 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:16.408119 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:16.408168 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:16.408199 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:16.408238 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:16.408270 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:16.433469 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:16.436696 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:16.436792 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.719298 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:17.903822 62530 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0206 06:48:17.904687 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:17.904722 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:17.904830 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:17.912856 62530 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0206 06:48:17.919578 62530 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0206 06:48:17.919904 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.920059 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.920373 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.920850 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.920972 62530 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0206 06:48:17.921249 62530 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0206 06:48:17.921533 62530 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0206 06:48:17.926803 62530 target.go:111] Terraform output is in /tmp/test2868971452/out --- PASS: TestExternalLoadBalancer (1.52s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0206 06:48:17.931563 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:17.931685 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:17.931728 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:17.931774 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:17.931814 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:17.931868 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:17.931950 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:17.931981 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:17.932019 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:17.932047 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:17.964804 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:17.967984 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968057 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968104 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968152 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968193 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968235 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:17.968279 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.199369 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:19.399956 62530 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0206 06:48:19.400887 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:19.400936 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:19.401065 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:19.403343 62530 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0206 06:48:19.409891 62530 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0206 06:48:19.410390 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.410539 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.410760 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411007 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411091 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411318 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411416 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411598 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.411729 62530 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0206 06:48:19.412166 62530 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0206 06:48:19.412706 62530 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0206 06:48:19.420000 62530 target.go:111] Terraform output is in /tmp/test1662207207/out --- PASS: TestMixedInstancesASG (1.50s) === RUN TestMixedInstancesSpotASG I0206 06:48:19.429613 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:19.429745 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:19.429803 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:19.429855 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:19.429897 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:19.429951 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:19.430035 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:19.430066 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:19.430103 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:19.430132 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:19.463340 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:19.466930 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467011 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467086 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467139 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467192 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467239 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:19.467282 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.718799 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:20.910809 62530 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0206 06:48:20.912139 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:20.912176 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:20.912271 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:20.915283 62530 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0206 06:48:20.921282 62530 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0206 06:48:20.921533 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.921985 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.922071 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.922266 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.922556 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.922746 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.922854 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.923342 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.923469 62530 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0206 06:48:20.923941 62530 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0206 06:48:20.924577 62530 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0206 06:48:20.931875 62530 target.go:111] Terraform output is in /tmp/test328694251/out --- PASS: TestMixedInstancesSpotASG (1.51s) === RUN TestAdditionalObjects I0206 06:48:20.941609 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:20.941742 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:20.941786 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:20.941837 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:20.941881 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:20.941935 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:20.942020 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:20.942050 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:20.942087 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:20.942118 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:20.969999 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0206 06:48:20.973337 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:20.973432 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.256527 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:22.426637 62530 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0206 06:48:22.427095 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:22.427131 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:22.427227 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:22.435808 62530 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0206 06:48:22.442286 62530 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0206 06:48:22.442772 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.443090 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.443584 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.443784 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.443905 62530 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0206 06:48:22.444245 62530 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0206 06:48:22.444628 62530 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0206 06:48:22.450160 62530 target.go:111] Terraform output is in /tmp/test1658439675/out --- PASS: TestAdditionalObjects (1.51s) === RUN TestContainerd I0206 06:48:22.454899 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:22.455026 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:22.455069 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:22.455119 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:22.455161 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:22.455214 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:22.455299 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:22.455331 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:22.455368 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:22.455397 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:22.482484 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:22.487453 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:22.487552 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:23.747793 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:23.941640 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:23.942479 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:23.942527 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:23.942625 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:23.944961 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:23.952975 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:23.955527 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:23.956985 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:23.957340 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:23.957590 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:23.957719 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:23.958091 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:23.958420 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:23.963824 62530 target.go:111] Terraform output is in /tmp/test2967481870/out --- PASS: TestContainerd (1.52s) === RUN TestContainerdCustom I0206 06:48:23.976900 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:23.977048 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:23.977093 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:23.977138 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:23.977185 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:23.977241 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:23.977326 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:23.977357 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:23.977395 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:23.977424 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:24.003740 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:24.007229 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.007321 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.512066 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:24.701980 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:24.702993 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:24.703029 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:24.703129 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:24.706719 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:24.713391 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:24.713599 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.713900 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.714278 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.714634 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.714767 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:24.715050 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:24.715475 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:24.720726 62530 target.go:111] Terraform output is in /tmp/test3851132466/out --- PASS: TestContainerdCustom (0.75s) === RUN TestDockerCustom I0206 06:48:24.725382 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:24.725512 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:24.725555 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:24.725600 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:24.725639 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:24.725689 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:24.725775 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:24.725804 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:24.725841 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:24.725869 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:24.756661 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0206 06:48:24.760159 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:24.760255 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.239588 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:25.408529 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:25.409318 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:25.409376 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:25.409505 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:25.417430 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:25.424158 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:25.424377 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.424839 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.425069 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.425593 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.425722 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:25.426008 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:25.426399 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:25.431768 62530 target.go:111] Terraform output is in /tmp/test2786486340/out --- PASS: TestDockerCustom (0.71s) === RUN TestAPIServerNodes I0206 06:48:25.436312 62530 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0206 06:48:25.436338 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:25.436459 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:25.436504 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:25.436550 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:25.436593 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:25.436646 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:25.436726 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:25.436756 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:25.436793 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:25.436821 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:25.465657 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:48:25.471201 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.471304 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:25.471363 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:26.810623 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:27.000726 62530 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0206 06:48:27.003182 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:27.003218 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:27.003310 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:27.005419 62530 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0206 06:48:27.015985 62530 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0206 06:48:27.016742 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.016895 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.017496 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.017699 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.018026 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.018127 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.018719 62530 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0206 06:48:27.019001 62530 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0206 06:48:27.019380 62530 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0206 06:48:27.025699 62530 target.go:111] Terraform output is in /tmp/test1540881162/out I0206 06:48:27.030621 62530 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.59s) === RUN TestNTHIMDSProcessor I0206 06:48:27.030763 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:27.030887 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:27.030929 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:27.030977 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:27.031018 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:27.031072 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:27.031154 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:27.031185 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:27.031224 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:27.031253 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:27.056493 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:27.059543 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:27.059622 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.354596 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:28.540411 62530 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0206 06:48:28.541862 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:28.541900 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:28.541995 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:28.544455 62530 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0206 06:48:28.550591 62530 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0206 06:48:28.550925 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.551707 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.552308 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.552636 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.553903 62530 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0206 06:48:28.554316 62530 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0206 06:48:28.555466 62530 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0206 06:48:28.560426 62530 target.go:111] Terraform output is in /tmp/test45629476/out --- PASS: TestNTHIMDSProcessor (1.53s) === RUN TestNTHIMDSProcessorIRSA I0206 06:48:28.564481 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:28.564604 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:28.564645 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:28.564730 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:28.564772 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:28.564821 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:28.564875 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:28.564926 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:28.564992 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:28.565041 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:28.591235 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:28.594585 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:28.594669 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:29.892816 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:30.117479 62530 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0206 06:48:30.118938 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:30.118981 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:30.119075 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:30.121257 62530 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0206 06:48:30.126941 62530 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0206 06:48:30.127438 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:30.127699 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:30.127951 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:30.128509 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:30.128629 62530 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0206 06:48:30.128985 62530 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0206 06:48:30.129264 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:30.135216 62530 target.go:111] Terraform output is in /tmp/test3576886811/out --- PASS: TestNTHIMDSProcessorIRSA (1.58s) === RUN TestCustomIRSA I0206 06:48:30.142597 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:30.142822 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:30.143642 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:30.143815 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:30.143884 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:30.143958 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:30.144022 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:30.144069 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:30.144126 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:30.144168 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:30.174244 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:30.177810 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:30.177901 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.157739 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:31.834944 62530 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0206 06:48:31.835366 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:31.835423 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:31.835570 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:31.844453 62530 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0206 06:48:31.850582 62530 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0206 06:48:31.850907 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.851276 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.851514 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.852037 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.852164 62530 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0206 06:48:31.852470 62530 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0206 06:48:31.852827 62530 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0206 06:48:31.859532 62530 target.go:111] Terraform output is in /tmp/test1804970680/out --- PASS: TestCustomIRSA (1.73s) === RUN TestClusterNameDigit I0206 06:48:31.868836 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:31.868962 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:31.869004 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:31.869054 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:31.869104 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:31.869158 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:31.869240 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:31.869268 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:31.869306 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:31.869333 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:31.902927 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:31.906462 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:31.906554 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.147835 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:33.341641 62530 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0206 06:48:33.344776 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:33.344812 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:33.344902 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:33.349203 62530 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0206 06:48:33.356235 62530 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0206 06:48:33.356656 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.356945 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.357204 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.357753 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.357868 62530 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0206 06:48:33.358139 62530 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0206 06:48:33.358455 62530 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0206 06:48:33.364721 62530 target.go:111] Terraform output is in /tmp/test3170064688/out --- PASS: TestClusterNameDigit (1.50s) === RUN TestCASPriorityExpander I0206 06:48:33.369838 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:33.369966 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:33.370008 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:33.370055 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:33.370095 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:33.370150 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:33.370232 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:33.370284 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:33.370324 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:33.370353 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:33.400894 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:48:33.404236 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.404318 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.404368 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:33.404416 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:48:35.347456 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:35.566693 62530 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0206 06:48:35.569036 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:35.569089 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:35.569238 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:35.571368 62530 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0206 06:48:35.578385 62530 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0206 06:48:35.578602 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.578996 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.579156 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.579385 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.579665 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.579792 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.579904 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.580065 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.580169 62530 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0206 06:48:35.580477 62530 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0206 06:48:35.580911 62530 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0206 06:48:35.591379 62530 target.go:111] Terraform output is in /tmp/test2118321465/out --- PASS: TestCASPriorityExpander (2.23s) === RUN TestCASPriorityExpanderCustom I0206 06:48:35.597103 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:35.597237 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:35.597284 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:35.597380 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:35.597424 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:35.597475 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:35.597517 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:35.597547 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:35.597585 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:35.597614 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:48:35.628756 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0206 06:48:35.632396 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.632485 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.632537 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:35.632590 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:48:36.908453 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:37.114610 62530 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0206 06:48:37.116113 62530 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0206 06:48:37.116162 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:37.116278 62530 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0206 06:48:37.118702 62530 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0206 06:48:37.124588 62530 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0206 06:48:37.124920 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.125065 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.125280 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.125521 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.125770 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.125869 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.126053 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.126189 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.126309 62530 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0206 06:48:37.126683 62530 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0206 06:48:37.127220 62530 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0206 06:48:37.137453 62530 target.go:111] Terraform output is in /tmp/test1755363002/out --- PASS: TestCASPriorityExpanderCustom (1.55s) === RUN TestLifecycleMinimalAWS I0206 06:48:37.143158 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:37.143289 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:37.143334 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:37.143387 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:37.143431 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:37.143483 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:37.143526 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:37.143555 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:37.143594 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:37.143620 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0206 06:48:37.168282 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:48:37.171315 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:37.171403 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:48:38.517990 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:38.697041 62530 iamrole.go:89] ListRoles: { } I0206 06:48:38.698751 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:38.698994 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:38.699183 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0206 06:48:38.699274 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.699324 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0206 06:48:38.699296 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:48:38.699476 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0206 06:48:38.699552 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0206 06:48:38.699545 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] }] } I0206 06:48:38.699714 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:38.699799 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:48:38.699903 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:48:38.699976 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:38.700105 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:48:38.700187 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:48:38.700380 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:48:38.700426 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:38.700458 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0206 06:48:38.700618 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.700718 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:48:38.701894 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:38.702100 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:38.702241 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:48:38.704325 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:38.704559 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] }] } I0206 06:48:38.704655 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:48:38.704695 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:38.704859 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:48:38.704850 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0206 06:48:38.704849 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:48:38.705067 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:48:38.705044 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:48:38.705121 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:48:38.705143 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:38.705251 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:48:38.705350 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0206 06:48:38.705588 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:38.705781 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0206 06:48:38.705893 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:48:38.705952 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }], VpcId: "vpc-1" } I0206 06:48:38.706058 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:48:38.706108 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:38.706151 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:48:38.706195 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:38.706307 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:48:38.706369 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:38.706451 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:48:38.706499 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:38.706540 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:48:38.706591 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:48:38.706735 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0206 06:48:38.706826 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:48:38.706872 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:48:38.707663 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:48:38.711802 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:38.711955 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:38.712123 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:48:38.712193 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0206 06:48:38.712441 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.712595 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.712734 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:48:38.712867 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:38.713015 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:48:38.713059 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:48:38.713172 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.713316 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:38.713415 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:38.713523 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.713756 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:48:38.713902 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:48:38.713966 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:38.714166 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:38.714309 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:38.714447 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.714652 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0206 06:48:38.714813 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.714957 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.715093 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.715266 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.715404 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:48:38.715641 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:38.715972 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:38.716267 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:38.716329 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:38.716370 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:38.716453 62530 dns.go:235] Pre-creating DNS records I0206 06:48:38.716486 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:38.722378 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0206 06:48:38.725465 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:38.725553 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0206 06:48:40.047810 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:40.228789 62530 iamrole.go:89] ListRoles: { } I0206 06:48:40.230442 62530 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0206 06:48:40.230683 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.230986 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:40.231039 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.231181 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:48:40.231219 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:48:40.231288 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.231482 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:48:40.231670 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.231855 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:40.234243 62530 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0206 06:48:40.234526 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:48:40.234486 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:40.234618 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:48:40.234670 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.234817 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.234952 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.235088 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:48:40.235131 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:40.235216 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0206 06:48:40.235365 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:40.235418 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0206 06:48:40.235607 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:40.240201 62530 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0206 06:48:40.240459 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:40.240671 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:40.240884 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:40.241028 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:40.241178 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:40.241348 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:40.241469 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:40.242052 62530 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0206 06:48:40.242275 62530 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0206 06:48:40.242576 62530 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0206 06:48:40.245167 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:48:40.245232 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:48:40.245275 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:48:40.245309 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:48:40.245344 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:48:40.245381 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:48:40.245417 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:48:40.245454 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:48:40.245492 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:48:40.245535 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:48:40.245576 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:48:40.245607 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:48:40.245640 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:48:40.245676 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:48:40.245711 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:48:40.245747 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:48:40.245782 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:48:40.245821 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:48:40.245857 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:48:40.245887 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:48:40.245921 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:48:40.245960 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:48:40.245997 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:48:40.246034 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:48:40.247324 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:48:40.247416 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:48:40.247438 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:48:40.247481 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247531 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0206 06:48:40.247588 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247644 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247703 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247790 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247866 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.247930 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0206 06:48:40.248007 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.248097 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:48:40.248149 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0206 06:48:40.248202 62530 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0206 06:48:40.248262 62530 api.go:53] PageSize not implemented I0206 06:48:40.248301 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:40.248347 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:40.248378 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:48:40.248431 62530 targetgroups.go:35] PageSize not implemented I0206 06:48:40.248462 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:48:40.248554 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:48:40.248606 62530 iamrole.go:89] ListRoles: { } I0206 06:48:40.248655 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:40.248685 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:40.248728 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:48:40.248773 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:48:40.248807 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:40.249369 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:nodes.minimal.example.com ok I0206 06:48:40.249430 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:48:40.249541 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0206 06:48:40.249435 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0206 06:48:40.249601 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:48:40.249585 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:48:40.249624 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0206 06:48:40.249629 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0206 06:48:40.249674 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0206 06:48:40.249572 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0206 06:48:40.249757 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0206 06:48:40.249858 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:48:40.249923 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0206 06:48:40.249968 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:40.250023 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0206 06:48:40.250235 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:48:40.250257 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:48:40.250297 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:48:40.250421 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0206 06:48:40.250479 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:48:40.250497 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:48:40.250535 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0206 06:48:40.250518 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:48:40.250572 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0206 06:48:40.250615 62530 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:48:40.250628 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:48:40.250656 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0206 06:48:40.250714 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:48:40.250790 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:48:40.250870 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (3.11s) === RUN TestLifecycleMinimalOpenstack I0206 06:48:40.251344 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0206 06:48:40.259252 62530 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:41.678491 62530 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0206 06:48:41.678543 62530 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0206 06:48:41.696788 62530 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/02/06 06:48:41 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:41 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0206 06:48:41.701519 62530 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0206 06:48:41.715090 62530 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0206 06:48:41.718979 62530 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/02/06 06:48:41 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:41 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:41 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0206 06:48:41.722016 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0206 06:48:41.722191 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0206 06:48:42.727805 62530 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:44.158522 62530 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0206 06:48:44.158586 62530 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0206 06:48:44.179862 62530 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0206 06:48:44.189622 62530 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0206 06:48:44.196482 62530 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0206 06:48:44.198423 62530 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0206 06:48:44.201574 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0206 06:48:44.202478 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0206 06:48:44.202837 62530 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0206 06:48:44.204433 62530 delete_cluster.go:128] Looking for cloud resources to delete 2024/02/06 06:48:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Port:73e6c23d-ef71-4552-812e-30d4a851aeb2 ok ServerGroup:768e479a-3579-4633-bbb0-0ee32e6e7b99 ok Network:9c7ec932-2885-4c4d-a652-8a1fa85359c9 ok Port:f746d3b5-5ee1-4ab4-b5b0-10a34b687a99 ok Instance:bde5fb89-518f-4fdc-84f7-60ceca06eb1d ok SecurityGroup:41dacfc2-e148-427f-87ce-325ab884559a ok SecurityGroup:b21621a8-117a-4067-8e23-47ef004bf5e9 ok Port:68e46a0b-cb12-45dc-91c5-df8d85aa3c37 ok Instance:5b5f1f19-f4f7-47e7-9daa-f7e5828331da ok ServerGroup:9b5a60d3-a06b-4a5e-b2e2-8597ac3a8f3d ok Subnet:c8abf48e-648a-41fd-9d8a-b5f4fadd06c0 ok SecurityGroup:18c0be37-9715-4e09-9c77-1bb5ae984d77 ok Instance:8a710c23-427d-42f2-8fe6-8324296a928f ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok --- PASS: TestLifecycleMinimalOpenstack (5.07s) === RUN TestLifecycleMinimalGCE I0206 06:48:45.319046 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0206 06:48:45.320854 62530 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:47.047678 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:48:47.047765 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:48:47.047913 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0206 06:48:47.047947 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0206 06:48:47.047969 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0206 06:48:47.048041 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:48:47.049326 62530 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0206 06:48:47.058148 62530 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0206 06:48:47.063795 62530 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0206 06:48:47.064851 62530 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0206 06:48:47.065066 62530 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0206 06:48:47.065190 62530 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:48.711983 62530 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0206 06:48:48.712099 62530 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0206 06:48:48.712254 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0206 06:48:48.712290 62530 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0206 06:48:48.712317 62530 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0206 06:48:48.712386 62530 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0206 06:48:48.713888 62530 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0206 06:48:48.717964 62530 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0206 06:48:48.723533 62530 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0206 06:48:48.724551 62530 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0206 06:48:48.724728 62530 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0206 06:48:48.726293 62530 delete_cluster.go:128] Looking for cloud resources to delete I0206 06:48:48.726336 62530 gce.go:99] Scanning zones: [us-test1-a] I0206 06:48:48.726697 62530 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0206 06:48:48.726720 62530 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:node-to-master-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok FirewallRule:node-to-node-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1707202127 ok InstanceTemplate:nodes-minimal-gce-example-com-1707202127 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.41s) === RUN TestLifecycleFloatingIPOpenstack I0206 06:48:48.728215 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0206 06:48:48.735992 62530 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:50.176502 62530 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0206 06:48:50.176549 62530 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0206 06:48:50.194229 62530 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/02/06 06:48:50 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:50 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0206 06:48:50.205504 62530 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0206 06:48:50.214669 62530 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0206 06:48:50.217738 62530 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/02/06 06:48:50 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:50 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:50 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0206 06:48:50.220061 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0206 06:48:50.220400 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0206 06:48:51.230463 62530 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0206 06:48:52.596708 62530 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0206 06:48:52.596755 62530 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0206 06:48:52.617208 62530 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0206 06:48:52.628847 62530 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0206 06:48:52.635372 62530 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0206 06:48:52.637059 62530 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0206 06:48:52.639690 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0206 06:48:52.640616 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0206 06:48:52.640799 62530 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0206 06:48:52.641132 62530 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0206 06:48:52.643105 62530 delete_cluster.go:128] Looking for cloud resources to delete 2024/02/06 06:48:52 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:696a2bf2-b66f-4a14-85e6-288fce203a9b ok Instance:0c8ea1a0-f2f8-46d6-98a0-bfbcf3ecf4ff ok Port:3284ec3e-b300-46b7-85f2-2cf3cd5817b0 ok Port:a44dfc9d-19a7-48f1-a00d-6ec6716c5875 ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Network:ed65861d-e971-44a6-8f89-bbf7715bbe9c ok Router:0ba6cae1-8016-4bb2-b0c5-1e62f23cc3e9 ok Subnet:696a2bf2-b66f-4a14-85e6-288fce203a9b ok SecurityGroup:d04e4b7c-3522-48f0-abe3-c143e61559bc ok SecurityGroup:9fea9f3a-9546-442a-8e11-5fb52e3b7d4f ok ServerGroup:f2f4cba3-bf1d-4b8d-b20a-54ee8a9fb0d9 ok Port:9f26f821-62e7-4045-a602-6d49e4ef85db ok Instance:bc761560-ed97-42b1-a6be-098913a7993b ok Port:030c6ddd-07d9-4f43-9a77-c950e1651247 ok SecurityGroup:d01845d5-5ab7-468e-935f-b59a3b7f7997 ok ServerGroup:0e804da1-1778-402f-a38d-1bf18ef73a56 ok Instance:e152ac2a-5df4-44e3-ac05-313a2a11c35d ok --- PASS: TestLifecycleFloatingIPOpenstack (5.02s) === RUN TestLifecyclePrivateCalico I0206 06:48:53.746837 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:53.746991 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:53.747061 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:53.747118 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:53.747164 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:53.747215 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:53.747261 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:53.747293 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:53.747330 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:53.747360 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0206 06:48:53.776824 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:48:53.780528 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:53.780648 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:53.780714 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.065250 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:55.509431 62530 iamrole.go:89] ListRoles: { } I0206 06:48:55.511708 62530 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0206 06:48:55.512273 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:48:55.512434 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.512664 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.512829 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:55.512979 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:48:55.513224 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.513414 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.513542 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:48:55.513653 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:55.513869 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.514078 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:55.514219 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:48:55.514741 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0206 06:48:55.514796 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.514828 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatecalico.example.com" }] } I0206 06:48:55.514971 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.515067 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:48:55.515101 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:48:55.515134 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:48:55.515176 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:55.515130 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0206 06:48:55.515240 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0206 06:48:55.515382 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0206 06:48:55.515451 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0206 06:48:55.516959 62530 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0206 06:48:55.517106 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0206 06:48:55.517265 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.517372 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0206 06:48:55.517362 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0206 06:48:55.517805 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0206 06:48:55.517858 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0206 06:48:55.517961 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:48:55.518012 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:55.518019 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0206 06:48:55.518109 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:48:55.518151 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0206 06:48:55.518157 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:55.518217 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0206 06:48:55.518237 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0206 06:48:55.518258 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" } ] } I0206 06:48:55.518359 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:55.518451 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:48:55.518407 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0206 06:48:55.518434 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0206 06:48:55.518516 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0206 06:48:55.518507 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:55.518546 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0206 06:48:55.518620 62530 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0206 06:48:55.518589 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.518782 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:48:55.518811 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.518825 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0206 06:48:55.518933 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:48:55.519015 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.519059 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0206 06:48:55.519146 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:48:55.519191 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:48:55.519200 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0206 06:48:55.519276 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:55.519365 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:55.519463 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0206 06:48:55.519587 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:55.519658 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0206 06:48:55.519795 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:48:55.519879 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:48:55.519992 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:48:55.520060 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:48:55.520121 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:55.520222 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:48:55.520280 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:48:55.520324 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:48:55.520443 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.520589 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:48:55.520659 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:55.520768 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:48:55.520817 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:48:55.520864 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:48:55.520808 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0206 06:48:55.521340 62530 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0206 06:48:55.521606 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0206 06:48:55.521692 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:55.521763 62530 api.go:53] PageSize not implemented W0206 06:48:55.521776 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:55.521723 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:55.521890 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:55.521897 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], Type: "network" } I0206 06:48:55.522010 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:48:55.521917 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:55.522066 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } I0206 06:48:55.522078 62530 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatecalico.example.com" }] } I0206 06:48:55.522153 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:55.522089 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:48:55.522192 62530 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0206 06:48:55.522218 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:48:55.522256 62530 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } W0206 06:48:55.522340 62530 api.go:53] PageSize not implemented I0206 06:48:55.522359 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:55.522279 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.522464 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.522676 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.522823 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.522953 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0206 06:48:55.523061 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:55.523139 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:55.523232 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:55.523303 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.523411 62530 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" }] }] } I0206 06:48:55.523486 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:48:55.523719 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.523873 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0206 06:48:55.523967 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.524108 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.524246 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.524383 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.524510 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.524636 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.524740 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:48:55.524868 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" }] }] } I0206 06:48:55.525004 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.525128 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0206 06:48:55.525173 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0206 06:48:55.525210 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.525367 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0206 06:48:55.525459 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:48:55.525552 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.525686 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.525809 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.525930 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:48:55.526053 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.526182 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.526319 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0206 06:48:55.526474 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0206 06:48:55.526527 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.526654 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.526702 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0206 06:48:55.526847 62530 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0206 06:48:55.526997 62530 api.go:53] PageSize not implemented I0206 06:48:55.526978 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:55.527073 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:55.527127 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:55.527154 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:55.527228 62530 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } W0206 06:48:55.527265 62530 api.go:53] PageSize not implemented I0206 06:48:55.527311 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:55.527324 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:55.527377 62530 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0206 06:48:55.527439 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:55.527487 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:48:55.527532 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:48:55.527573 62530 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0206 06:48:55.532923 62530 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0206 06:48:55.533203 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.533343 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.533538 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.533668 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.533758 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:55.533944 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0206 06:48:55.534243 62530 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0206 06:48:55.534537 62530 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0206 06:48:55.534880 62530 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0206 06:48:55.534934 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:55.534972 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:55.535040 62530 dns.go:235] Pre-creating DNS records I0206 06:48:55.535066 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:55.541684 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:48:55.545409 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.545495 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:55.545556 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:56.837392 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:57.274586 62530 iamrole.go:89] ListRoles: { } I0206 06:48:57.276764 62530 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0206 06:48:57.277306 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.277960 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] }] } I0206 06:48:57.278286 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:57.279005 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:48:57.279311 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.280038 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.280184 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:48:57.280239 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:48:57.280316 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:57.282026 62530 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0206 06:48:57.282164 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.282392 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0206 06:48:57.282294 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0206 06:48:57.282454 62530 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0206 06:48:57.282507 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:48:57.282544 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0206 06:48:57.282551 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0206 06:48:57.282653 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0206 06:48:57.282705 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0206 06:48:57.282629 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0206 06:48:57.282892 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:48:57.282967 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.283114 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:57.283216 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0206 06:48:57.283359 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:57.283418 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.283593 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.283755 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:48:57.283804 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0206 06:48:57.283962 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:57.284029 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.284201 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:48:57.284250 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:57.284395 62530 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0206 06:48:57.284573 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:57.284757 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:57.284823 62530 api.go:53] PageSize not implemented I0206 06:48:57.284789 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0206 06:48:57.284835 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:57.284868 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.284958 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0206 06:48:57.284992 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.285016 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0206 06:48:57.285055 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0206 06:48:57.285058 62530 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0206 06:48:57.285105 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0206 06:48:57.284921 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.285145 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0206 06:48:57.285189 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0206 06:48:57.285238 62530 api.go:53] PageSize not implemented I0206 06:48:57.285260 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.285536 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:57.285671 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:57.285757 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:48:57.285805 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0206 06:48:57.285888 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:57.285976 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0206 06:48:57.286078 62530 executor.go:111] Tasks: 120 done / 142 total; 6 can run I0206 06:48:57.286167 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0206 06:48:57.286221 62530 api.go:53] PageSize not implemented I0206 06:48:57.286238 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:48:57.286264 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.286256 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:48:57.286370 62530 api.go:53] PageSize not implemented I0206 06:48:57.286377 62530 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0206 06:48:57.286411 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:57.286481 62530 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0206 06:48:57.286433 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.286633 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.286710 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.292104 62530 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0206 06:48:57.292311 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.292455 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.292557 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.292766 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.292844 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:57.293605 62530 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0206 06:48:57.293760 62530 api.go:53] PageSize not implemented I0206 06:48:57.293795 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.294035 62530 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0206 06:48:57.294256 62530 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0206 06:48:57.297644 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:48:57.297717 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:48:57.297793 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:48:57.297862 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0206 06:48:57.297935 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:48:57.298003 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:48:57.298066 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:48:57.298138 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:48:57.298206 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:48:57.298273 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:48:57.298339 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:48:57.298408 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0206 06:48:57.298478 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:48:57.298539 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:48:57.298601 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:48:57.298662 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:48:57.298731 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:48:57.298794 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:48:57.298857 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:48:57.298922 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:48:57.298982 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:48:57.299048 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:48:57.299119 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:48:57.299185 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:48:57.299240 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:48:57.299311 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:48:57.299366 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:48:57.299427 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:48:57.299493 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:48:57.299561 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:48:57.299621 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:48:57.301212 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:48:57.301303 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:48:57.301335 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:48:57.301400 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301482 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0206 06:48:57.301579 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301669 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301738 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301818 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301881 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.301956 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0206 06:48:57.302044 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.302124 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:48:57.302173 62530 natgateway.go:117] DescribeNatGateways: { } I0206 06:48:57.302237 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0206 06:48:57.302294 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0206 06:48:57.302380 62530 api.go:53] PageSize not implemented I0206 06:48:57.302409 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0206 06:48:57.302475 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:57.302512 62530 loadbalancers.go:35] PageSize not implemented I0206 06:48:57.302536 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0206 06:48:57.302597 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:48:57.302637 62530 targetgroups.go:35] PageSize not implemented I0206 06:48:57.302663 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" ] } I0206 06:48:57.302755 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:48:57.302824 62530 iamrole.go:89] ListRoles: { } I0206 06:48:57.302901 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:57.302949 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:57.303018 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:48:57.303090 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:48:57.303156 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0206 06:48:57.303213 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:48:57.303276 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-group:nodes.privatecalico.example.com ok I0206 06:48:57.303976 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0206 06:48:57.304057 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0206 06:48:57.304059 62530 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } autoscaling-group:bastion.privatecalico.example.com ok I0206 06:48:57.304135 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:48:57.304159 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0206 06:48:57.304167 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0206 06:48:57.304206 62530 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0206 06:48:57.304245 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } load-balancer:api-privatecalico-example-0uch4k ok I0206 06:48:57.304270 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0206 06:48:57.304195 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok W0206 06:48:57.304336 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok I0206 06:48:57.304354 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok nat-gateway:nat-1 ok I0206 06:48:57.304379 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok I0206 06:48:57.304393 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:48:57.304438 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0206 06:48:57.304465 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-3 ok autoscaling-config:lt-1 ok I0206 06:48:57.304538 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:57.304291 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.privatecalico.example.com. ok I0206 06:48:57.304616 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 } ] } W0206 06:48:57.304809 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:48:57.304835 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:48:57.304871 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:48:57.304920 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:48:57.304967 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0206 06:48:57.305177 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:48:57.305198 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0206 06:48:57.305231 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0206 06:48:57.305288 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok I0206 06:48:57.305400 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:57.305418 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0206 06:48:57.305473 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0206 06:48:57.305517 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0206 06:48:57.305636 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0206 06:48:57.305694 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0206 06:48:57.305578 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } W0206 06:48:57.305774 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:48:57.305802 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:48:57.305762 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0206 06:48:57.305862 62530 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0206 06:48:57.305850 62530 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0206 06:48:57.305890 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0206 06:48:57.305939 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0206 06:48:57.305950 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:48:57.305990 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0206 06:48:57.306045 62530 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0206 06:48:57.306061 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0206 06:48:57.306104 62530 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0206 06:48:57.306226 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0206 06:48:57.306309 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:48:57.306413 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:48:57.306508 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.56s) === RUN TestLifecyclePrivateKopeio I0206 06:48:57.307083 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:48:57.307255 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:48:57.307301 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:48:57.307355 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:48:57.307408 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:48:57.307462 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:48:57.307524 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:48:57.307567 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:48:57.307611 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:48:57.307650 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0206 06:48:57.336827 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:57.340432 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.340545 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:57.340624 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.646213 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:58.843249 62530 iamrole.go:89] ListRoles: { } I0206 06:48:58.845415 62530 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0206 06:48:58.845637 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.845878 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:58.846127 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:48:58.846146 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0206 06:48:58.846219 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.846279 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" }] } I0206 06:48:58.846453 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.846605 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:48:58.846705 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0206 06:48:58.846827 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0206 06:48:58.846742 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:48:58.847003 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:48:58.847117 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.847259 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:48:58.847225 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0206 06:48:58.847312 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0206 06:48:58.847311 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:48:58.847502 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.847713 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.847921 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.848000 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:48:58.848034 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:48:58.848059 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:48:58.848098 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:58.849549 62530 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0206 06:48:58.849692 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0206 06:48:58.849847 62530 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0206 06:48:58.849782 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:58.849882 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0206 06:48:58.849934 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0206 06:48:58.849934 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:48:58.850030 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0206 06:48:58.850033 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0206 06:48:58.850115 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:48:58.850152 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0206 06:48:58.850168 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] }] } I0206 06:48:58.850252 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0206 06:48:58.850372 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0206 06:48:58.850489 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0206 06:48:58.850381 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0206 06:48:58.850597 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0206 06:48:58.850674 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0206 06:48:58.850693 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.850804 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:48:58.850914 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0206 06:48:58.850913 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] }] } I0206 06:48:58.851039 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0206 06:48:58.851128 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0206 06:48:58.851170 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0206 06:48:58.851268 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:48:58.851313 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0206 06:48:58.851415 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:58.851509 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:48:58.851556 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:48:58.851593 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.851725 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0206 06:48:58.851794 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.851847 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0206 06:48:58.851937 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0206 06:48:58.851984 62530 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" } ] } I0206 06:48:58.852048 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:48:58.852082 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.852195 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.851941 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0206 06:48:58.852297 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0206 06:48:58.852408 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:48:58.852379 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0206 06:48:58.852449 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:48:58.852564 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:58.852648 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0206 06:48:58.852768 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:48:58.852642 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:48:58.852818 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:48:58.852883 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.852981 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:48:58.853048 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:48:58.853099 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:48:58.853144 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0206 06:48:58.853234 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:48:58.853291 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:48:58.853346 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:48:58.853395 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:48:58.853439 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:48:58.853488 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:48:58.853524 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:48:58.853570 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] } I0206 06:48:58.853669 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0206 06:48:58.853778 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0206 06:48:58.853836 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:48:58.853918 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:48:58.853964 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:48:58.854047 62530 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0206 06:48:58.854157 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:58.854373 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0206 06:48:58.854442 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:58.854474 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:48:58.854546 62530 loadbalancers.go:35] PageSize not implemented W0206 06:48:58.854575 62530 api.go:53] PageSize not implemented I0206 06:48:58.854558 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:58.854663 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-2" },{ SubnetId: "subnet-4" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0206 06:48:58.854691 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.854733 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:48:58.854826 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.854835 62530 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatekopeio.example.com" }] } I0206 06:48:58.854901 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:48:58.854940 62530 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0206 06:48:58.854995 62530 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0206 06:48:58.854994 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0206 06:48:58.855122 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:48:58.855247 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.855399 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0206 06:48:58.855514 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.855660 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.855795 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.855921 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:48:58.855994 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.856130 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:58.856193 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:48:58.856288 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.856416 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.856550 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.856680 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0206 06:48:58.856753 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0206 06:48:58.856817 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:48:58.856912 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:48:58.856953 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:48:58.856991 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.857190 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:48:58.857235 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.857366 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0206 06:48:58.857406 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.857541 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:48:58.857639 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.857767 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.857892 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.858012 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.858132 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.858262 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0206 06:48:58.858347 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:48:58.858388 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:48:58.858422 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0206 06:48:58.858463 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.858589 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" }] }] } I0206 06:48:58.858719 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.858848 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0206 06:48:58.858930 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0206 06:48:58.858972 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0206 06:48:58.859026 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } W0206 06:48:58.859173 62530 api.go:53] PageSize not implemented I0206 06:48:58.859096 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0206 06:48:58.859201 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:48:58.859232 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0206 06:48:58.859265 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-4" } I0206 06:48:58.859295 62530 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0206 06:48:58.859337 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0206 06:48:58.859380 62530 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0206 06:48:58.859419 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0206 06:48:58.859469 62530 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0206 06:48:58.859559 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:48:58.859610 62530 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0206 06:48:58.859650 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:48:58.859691 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0206 06:48:58.859725 62530 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0206 06:48:58.859769 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0206 06:48:58.859832 62530 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0206 06:48:58.859932 62530 api.go:53] PageSize not implemented I0206 06:48:58.859939 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:48:58.859984 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:48:58.860050 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:58.860143 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0206 06:48:58.860250 62530 api.go:53] PageSize not implemented I0206 06:48:58.860214 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:58.860309 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0206 06:48:58.860325 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:58.860404 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-2" } I0206 06:48:58.860309 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:48:58.860467 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:48:58.870206 62530 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0206 06:48:58.870555 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.870686 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.870848 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.870970 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.871407 62530 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0206 06:48:58.871718 62530 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0206 06:48:58.871968 62530 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0206 06:48:58.872028 62530 zones.go:93] ListHostedZonesPages { } I0206 06:48:58.872066 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:58.872141 62530 dns.go:235] Pre-creating DNS records I0206 06:48:58.872169 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:48:58.879345 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:48:58.882887 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.882977 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:48:58.883040 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.167760 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:00.357531 62530 iamrole.go:89] ListRoles: { } I0206 06:49:00.359968 62530 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0206 06:49:00.360427 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] }] } I0206 06:49:00.360677 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.360734 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:00.360868 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.361107 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.361272 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:00.361318 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:00.361385 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:00.361448 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:00.364387 62530 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0206 06:49:00.364548 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0206 06:49:00.364548 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:00.364648 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0206 06:49:00.364649 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0206 06:49:00.364735 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0206 06:49:00.364756 62530 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0206 06:49:00.364775 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0206 06:49:00.364682 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] }] } I0206 06:49:00.364869 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.365103 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0206 06:49:00.365155 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0206 06:49:00.365327 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:00.365385 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0206 06:49:00.365582 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:00.365652 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.365787 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.365916 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.366039 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:00.366134 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.366271 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:00.366330 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.366515 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:00.366562 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0206 06:49:00.366688 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0206 06:49:00.366815 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:00.366912 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:00.366958 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:00.367061 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.367263 62530 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0206 06:49:00.367372 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:00.367478 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0206 06:49:00.367639 62530 api.go:53] PageSize not implemented I0206 06:49:00.367649 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:00.367673 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.367744 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:00.367793 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.367859 62530 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0206 06:49:00.367903 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0206 06:49:00.367898 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.368016 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0206 06:49:00.367977 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:00.368086 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0206 06:49:00.368128 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0206 06:49:00.368124 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:00.368164 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0206 06:49:00.368201 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0206 06:49:00.368238 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } W0206 06:49:00.368318 62530 api.go:53] PageSize not implemented I0206 06:49:00.368337 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.368500 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:00.368626 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0206 06:49:00.368853 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0206 06:49:00.369015 62530 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0206 06:49:00.369105 62530 api.go:53] PageSize not implemented I0206 06:49:00.369105 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:00.369180 62530 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0206 06:49:00.369142 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.369162 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:00.369184 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:00.369341 62530 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" W0206 06:49:00.369286 62530 api.go:53] PageSize not implemented I0206 06:49:00.369325 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:00.369435 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.369556 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.369627 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.374810 62530 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0206 06:49:00.374936 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.375075 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.375244 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.375345 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.376090 62530 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0206 06:49:00.376194 62530 api.go:53] PageSize not implemented I0206 06:49:00.376216 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.376398 62530 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0206 06:49:00.376626 62530 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0206 06:49:00.380017 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:00.380086 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:00.380130 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:00.380170 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:00.380203 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:00.380237 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:00.380270 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:00.380307 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:00.380347 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:00.380429 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:00.380470 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0206 06:49:00.380511 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:00.380548 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:00.380582 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:00.380620 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:00.380657 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:00.380696 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0206 06:49:00.380734 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:00.380770 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:00.380804 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:00.380840 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:49:00.380874 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:00.380926 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:00.380960 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:00.380997 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:49:00.381033 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0206 06:49:00.381069 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:00.381101 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:00.381133 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:00.381172 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:00.381210 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:00.381245 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:00.382859 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:00.382925 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:00.382945 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:00.382988 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383045 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0206 06:49:00.383114 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383176 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383222 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383272 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383315 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383364 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0206 06:49:00.383428 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383493 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:00.383527 62530 natgateway.go:117] DescribeNatGateways: { } I0206 06:49:00.383564 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0206 06:49:00.383608 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0206 06:49:00.383661 62530 api.go:53] PageSize not implemented I0206 06:49:00.383679 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0206 06:49:00.383741 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:00.383770 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:00.383785 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0206 06:49:00.383822 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:00.383845 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:00.383861 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" ] } I0206 06:49:00.383930 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:00.383970 62530 iamrole.go:89] ListRoles: { } I0206 06:49:00.384015 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:00.384041 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:00.384082 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:00.384132 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:00.384183 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-3","rtb-2"] } I0206 06:49:00.384228 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0206 06:49:00.384259 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } autoscaling-group:nodes.privatekopeio.example.com ok I0206 06:49:00.384892 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:49:00.384956 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok autoscaling-config:lt-2 ok internet-gateway:igw-2 ok I0206 06:49:00.384995 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:00.385022 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0206 06:49:00.385019 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0206 06:49:00.385088 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0206 06:49:00.385092 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } autoscaling-group:bastion.privatekopeio.example.com ok I0206 06:49:00.385106 62530 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } load-balancer:api-privatekopeio-example-tl2bv8 ok I0206 06:49:00.385077 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0206 06:49:00.385147 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } W0206 06:49:00.385211 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:00.385235 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } I0206 06:49:00.385234 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } security-group:sg-2 ok iam-instance-profile:bastions.privatekopeio.example.com ok load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok I0206 06:49:00.385276 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0206 06:49:00.385326 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok I0206 06:49:00.385304 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-3 ok I0206 06:49:00.385232 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.privatekopeio.example.com ok I0206 06:49:00.385445 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:00.385513 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0206 06:49:00.385717 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:00.385741 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0206 06:49:00.385786 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:00.385848 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0206 06:49:00.385903 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:00.385953 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0206 06:49:00.386122 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:00.386135 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0206 06:49:00.386236 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0206 06:49:00.386293 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:00.386272 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0206 06:49:00.386360 62530 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0206 06:49:00.386354 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0206 06:49:00.386393 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0206 06:49:00.386491 62530 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0206 06:49:00.386447 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0206 06:49:00.386516 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } W0206 06:49:00.386563 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:00.386584 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0206 06:49:00.386582 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:00.386602 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0206 06:49:00.386625 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0206 06:49:00.386642 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } subnet:subnet-1 ok iam-role:nodes.privatekopeio.example.com ok I0206 06:49:00.386672 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0206 06:49:00.386705 62530 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } I0206 06:49:00.386699 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } iam-role:bastions.privatekopeio.example.com ok subnet:subnet-2 ok I0206 06:49:00.386741 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0206 06:49:00.386773 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0206 06:49:00.386858 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:00.386921 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0206 06:49:00.386977 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0206 06:49:00.387078 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:49:00.387161 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (3.08s) === RUN TestLifecycleIPv6 I0206 06:49:00.387679 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:00.387830 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:00.387869 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:00.387913 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:00.387953 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:00.388002 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:00.388043 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:00.388075 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:00.388117 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:00.388147 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0206 06:49:00.418518 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:49:00.422211 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:00.422298 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.700858 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:01.885841 62530 iamrole.go:89] ListRoles: { } I0206 06:49:01.888003 62530 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0206 06:49:01.888228 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.888363 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:01.888423 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.888435 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.888559 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0206 06:49:01.888678 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.888702 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] } I0206 06:49:01.888800 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:01.888956 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:01.889018 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:01.889140 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:01.889199 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:49:01.889236 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:49:01.889263 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:01.889319 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:01.889347 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.889453 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.889572 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:01.890061 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:01.890173 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.890483 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0206 06:49:01.890590 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" }] } I0206 06:49:01.891946 62530 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0206 06:49:01.892099 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.892231 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0206 06:49:01.892322 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0206 06:49:01.892267 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0206 06:49:01.892342 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.892363 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0206 06:49:01.892449 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0206 06:49:01.892360 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0206 06:49:01.892509 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:01.892500 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0206 06:49:01.892916 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0206 06:49:01.892933 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0206 06:49:01.893005 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.timeout_seconds", Value: "30" },{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0206 06:49:01.893018 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:01.893066 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0206 06:49:01.893093 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0206 06:49:01.893202 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0206 06:49:01.893411 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:01.893514 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:01.893562 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:01.893605 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:49:01.893572 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0206 06:49:01.893653 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.893861 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0206 06:49:01.894077 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0206 06:49:01.894191 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0206 06:49:01.894319 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.894426 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.894521 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:01.894597 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:01.894694 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:01.894756 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:01.894794 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:01.894881 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:01.894923 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:01.894591 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0206 06:49:01.894972 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.895092 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:01.895148 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:01.895299 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:01.895276 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0206 06:49:01.895380 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0206 06:49:01.895475 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0206 06:49:01.895522 62530 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:49:01.895598 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:49:01.895714 62530 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0206 06:49:01.895873 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.896022 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:01.896156 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.896153 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:49:01.896377 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:01.896432 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:01.896437 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:49:01.896555 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.896736 62530 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.896920 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.897150 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.897301 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.897477 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0206 06:49:01.897598 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0206 06:49:01.897770 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:49:01.897828 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:01.897877 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:01.897947 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.898056 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.898206 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.898224 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0206 06:49:01.898286 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.898397 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0206 06:49:01.898370 62530 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.898445 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] }] } I0206 06:49:01.898537 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" }] }] } I0206 06:49:01.898668 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0206 06:49:01.898684 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.898819 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:01.898916 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.898979 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0206 06:49:01.899079 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" }] }] } I0206 06:49:01.899097 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:49:01.899217 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0206 06:49:01.899263 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.899399 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.899522 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.899650 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.899771 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.899907 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.900048 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0206 06:49:01.900096 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0206 06:49:01.900133 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.900276 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-2" } I0206 06:49:01.900320 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:49:01.900432 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.900557 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:49:01.900683 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.900814 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0206 06:49:01.900946 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0206 06:49:01.901000 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0206 06:49:01.901048 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0206 06:49:01.901094 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:01.901140 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:01.901179 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0206 06:49:01.901219 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0206 06:49:01.901298 62530 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0206 06:49:01.901387 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:01.901519 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0206 06:49:01.901499 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0206 06:49:01.901559 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-5" } W0206 06:49:01.901581 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:01.901598 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.901673 62530 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:01.901701 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-5" },{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0206 06:49:01.901747 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.901793 62530 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0206 06:49:01.901888 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:49:01.901932 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:01.901981 62530 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0206 06:49:01.902026 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0206 06:49:01.902069 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-6" } I0206 06:49:01.902104 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.902226 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:01.902271 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:49:01.902305 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.902421 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0206 06:49:01.902459 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0206 06:49:01.902494 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.902610 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0206 06:49:01.902653 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0206 06:49:01.902686 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:01.902805 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0206 06:49:01.902851 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0206 06:49:01.902890 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.902958 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-2" } I0206 06:49:01.902991 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:01.903051 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0206 06:49:01.903112 62530 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-5"] }] } I0206 06:49:01.903134 62530 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } W0206 06:49:01.903205 62530 api.go:53] PageSize not implemented I0206 06:49:01.903264 62530 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-5", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }] }] } I0206 06:49:01.903363 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0206 06:49:01.903407 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0206 06:49:01.903452 62530 tags.go:42] CreateTags { Resources: ["subnet-5"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0206 06:49:01.903535 62530 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0206 06:49:01.903616 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:01.903724 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:01.903755 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:01.903815 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:01.903726 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.903837 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:01.903888 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:01.903993 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-2" } I0206 06:49:01.903991 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:01.904059 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.904117 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:01.904168 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:01.904181 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0206 06:49:01.904184 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:01.904241 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:01.904360 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-2" } I0206 06:49:01.904413 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:01.904526 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0206 06:49:01.909760 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:01.909964 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.910102 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.910266 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.910411 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.910917 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:01.911267 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:01.911603 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:01.911656 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:01.911695 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:01.911765 62530 dns.go:235] Pre-creating DNS records I0206 06:49:01.911792 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:01.918350 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0206 06:49:01.922159 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:01.922252 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.236604 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:03.428564 62530 iamrole.go:89] ListRoles: { } I0206 06:49:03.430569 62530 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0206 06:49:03.430897 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.431730 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:03.432121 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.432225 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:03.432251 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:03.432294 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:03.432535 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:03.432922 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.433410 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.435040 62530 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0206 06:49:03.435188 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0206 06:49:03.435185 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:03.435355 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0206 06:49:03.435426 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0206 06:49:03.435455 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0206 06:49:03.435487 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0206 06:49:03.435371 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.435612 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.435756 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0206 06:49:03.435935 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:03.436005 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.436151 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.436297 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0206 06:49:03.436446 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:03.436517 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.436654 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:03.436743 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0206 06:49:03.436859 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:03.437225 62530 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0206 06:49:03.437464 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.437554 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] }] } I0206 06:49:03.437732 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] }] } I0206 06:49:03.437917 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0206 06:49:03.437968 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.438054 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:49:03.438094 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0206 06:49:03.438135 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0206 06:49:03.438200 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:03.438342 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:03.438435 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.438582 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:03.438657 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.438873 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.439010 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0206 06:49:03.439197 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.439309 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0206 06:49:03.439348 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0206 06:49:03.439384 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0206 06:49:03.439434 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.439572 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.439677 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:03.439713 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0206 06:49:03.439753 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:03.439821 62530 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0206 06:49:03.439910 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.440001 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.440050 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:03.440122 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:03.440116 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0206 06:49:03.440142 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.440184 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.440220 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0206 06:49:03.440262 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0206 06:49:03.440299 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0206 06:49:03.440193 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0206 06:49:03.440425 62530 api.go:53] PageSize not implemented I0206 06:49:03.440451 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.440566 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.440647 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:49:03.440715 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:03.440798 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0206 06:49:03.440877 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.440978 62530 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0206 06:49:03.441058 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:03.441112 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:03.441058 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.441130 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:03.441181 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:03.441164 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.441100 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:03.441284 62530 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0206 06:49:03.441199 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.441269 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:03.441321 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:03.441405 62530 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0206 06:49:03.441391 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:03.441428 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:03.441492 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.441551 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.441726 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:03.441762 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.446941 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:03.447140 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.447310 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.447421 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.447591 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.448299 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:03.448581 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:03.448837 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:03.452232 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:03.452303 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:03.452346 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:03.452381 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0206 06:49:03.452420 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0206 06:49:03.452457 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:03.452490 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0206 06:49:03.452528 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:03.452561 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:03.452594 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:03.452631 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:03.452667 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:03.452706 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:03.452750 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:49:03.452788 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0206 06:49:03.452822 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:03.452853 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:03.452889 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:03.452925 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:03.452958 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:03.452994 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0206 06:49:03.453029 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:03.453067 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:03.453102 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:03.453138 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:03.453177 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:03.453210 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:03.453251 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:49:03.453287 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0206 06:49:03.453324 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0206 06:49:03.453361 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0206 06:49:03.453398 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:03.453430 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:03.453466 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:03.453504 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:03.453541 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:03.453579 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:03.455665 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:03.455735 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:03.455755 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:03.455795 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.455850 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0206 06:49:03.455912 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.455972 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456023 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456071 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456120 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456171 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0206 06:49:03.456237 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456317 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:03.456353 62530 natgateway.go:117] DescribeNatGateways: { } I0206 06:49:03.456397 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0206 06:49:03.456437 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0206 06:49:03.456494 62530 api.go:53] PageSize not implemented I0206 06:49:03.456516 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:03.456541 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:03.456557 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0206 06:49:03.456597 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:03.456620 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:03.456637 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0206 06:49:03.456700 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:03.456735 62530 iamrole.go:89] ListRoles: { } I0206 06:49:03.456779 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:03.456809 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:03.456852 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:03.456901 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:03.456949 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3","rtb-2","rtb-1"] } I0206 06:49:03.456993 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:49:03.457048 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0206 06:49:03.457087 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0206 06:49:03.457121 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0206 06:49:03.457799 62530 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok I0206 06:49:03.457880 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.minimal-ipv6.example.com ok I0206 06:49:03.457990 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0206 06:49:03.458074 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0206 06:49:03.457893 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:03.458113 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.minimal-ipv6.example.com ok I0206 06:49:03.458114 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok I0206 06:49:03.458156 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } iam-instance-profile:masters.minimal-ipv6.example.com ok I0206 06:49:03.457935 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0206 06:49:03.458225 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:03.458224 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0206 06:49:03.458247 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0206 06:49:03.458335 62530 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0206 06:49:03.458406 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0206 06:49:03.458475 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:03.458569 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0206 06:49:03.458610 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0206 06:49:03.458669 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:03.458718 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0206 06:49:03.458866 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:03.458881 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:03.458922 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok autoscaling-config:lt-1 ok I0206 06:49:03.458986 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:49:03.459051 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0206 06:49:03.459093 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:49:03.459153 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0206 06:49:03.459212 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:03.459261 62530 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0206 06:49:03.459374 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0206 06:49:03.459433 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0206 06:49:03.459437 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } I0206 06:49:03.459486 62530 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com subnet:subnet-4 ok I0206 06:49:03.459519 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0206 06:49:03.459532 62530 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0206 06:49:03.459594 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0206 06:49:03.459553 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0206 06:49:03.459645 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0206 06:49:03.459690 62530 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0206 06:49:03.459689 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0206 06:49:03.459738 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0206 06:49:03.459754 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0206 06:49:03.459783 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0206 06:49:03.459859 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0206 06:49:03.459942 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:03.460078 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:49:03.460172 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (3.07s) === RUN TestLifecycleSharedVPC I0206 06:49:03.460682 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:03.460823 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:03.460862 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:03.460906 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:03.460946 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:03.460996 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:03.461037 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:03.461065 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:03.461103 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:03.461132 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0206 06:49:03.491940 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:03.495168 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:03.495266 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.789121 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:04.965800 62530 iamrole.go:89] ListRoles: { } I0206 06:49:04.966959 62530 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0206 06:49:04.967348 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0206 06:49:04.967452 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" }] } I0206 06:49:04.969077 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0206 06:49:04.969154 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0206 06:49:04.969331 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:04.969411 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:04.969463 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:04.969526 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:04.969710 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:04.969783 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:04.969847 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:04.969915 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:04.970069 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.970243 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:04.970421 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:04.970542 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:04.975366 62530 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0206 06:49:04.975523 62530 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0206 06:49:04.975565 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:04.975688 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:04.975742 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0206 06:49:04.975826 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0206 06:49:04.975923 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:04.975927 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0206 06:49:04.976071 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0206 06:49:04.975975 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0206 06:49:04.976225 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:49:04.976367 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:04.976502 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0206 06:49:04.976551 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0206 06:49:04.976699 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:04.976923 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0206 06:49:04.976956 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:04.977118 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:04.977189 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:04.977240 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:04.977331 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:04.977372 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:04.977424 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:04.977474 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:04.978993 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0206 06:49:04.983180 62530 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0206 06:49:04.983452 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.983736 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.983908 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" }] }] } I0206 06:49:04.984149 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.984256 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.984502 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.984859 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0206 06:49:04.985030 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:04.985113 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:04.985185 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:04.985250 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.985388 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.985555 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.985699 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0206 06:49:04.985745 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0206 06:49:04.985872 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.985999 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0206 06:49:04.986048 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" }] }] } I0206 06:49:04.986185 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0206 06:49:04.986311 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:04.986355 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:49:04.986391 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" }] }] } I0206 06:49:04.986533 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.986625 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.986767 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0206 06:49:04.987114 62530 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0206 06:49:04.987423 62530 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0206 06:49:04.987736 62530 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0206 06:49:04.987805 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:04.987845 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:04.987917 62530 dns.go:235] Pre-creating DNS records I0206 06:49:04.987951 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:04.993867 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:04.997051 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:04.997142 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.292128 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:06.480578 62530 iamrole.go:89] ListRoles: { } I0206 06:49:06.482161 62530 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0206 06:49:06.482669 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:06.482896 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.483631 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] }] } I0206 06:49:06.484171 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:06.484286 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:06.484321 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:06.484380 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:06.486161 62530 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0206 06:49:06.486430 62530 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0206 06:49:06.486386 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.486575 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0206 06:49:06.486575 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0206 06:49:06.486748 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:06.486802 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0206 06:49:06.487009 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:06.487161 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:06.487316 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.487476 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:06.492225 62530 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0206 06:49:06.492420 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:06.492601 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.492740 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.492922 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.493095 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.493285 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:06.493426 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:06.493827 62530 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0206 06:49:06.494055 62530 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0206 06:49:06.494358 62530 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0206 06:49:06.496969 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:06.497059 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:06.497102 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:06.497135 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:06.497169 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:06.497201 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:06.497237 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:06.497274 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:06.497315 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:06.497345 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:06.497378 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:06.497411 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:06.497441 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:06.497472 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:06.497507 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:06.497544 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:06.497575 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:06.497606 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:06.497636 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:06.497674 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:06.497710 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:06.499040 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:06.499105 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:06.499124 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:06.499161 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499208 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0206 06:49:06.499268 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499326 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499365 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499406 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499446 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499482 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0206 06:49:06.499528 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499586 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0206 06:49:06.499622 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0206 06:49:06.499671 62530 api.go:53] PageSize not implemented I0206 06:49:06.499692 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:06.499718 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:06.499737 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:06.499762 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:06.499781 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:06.499832 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:06.499866 62530 iamrole.go:89] ListRoles: { } I0206 06:49:06.499914 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:06.499943 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:06.499984 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:06.500022 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:06.500050 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0206 06:49:06.500503 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:06.500486 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } autoscaling-group:nodes.sharedvpc.example.com ok I0206 06:49:06.500638 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0206 06:49:06.500704 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0206 06:49:06.500764 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0206 06:49:06.500594 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedvpc.example.com. ok I0206 06:49:06.500589 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0206 06:49:06.500866 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:06.500891 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-1 ok I0206 06:49:06.500956 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:06.501013 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok I0206 06:49:06.501076 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:06.501125 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0206 06:49:06.501243 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:06.501256 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:06.501308 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0206 06:49:06.501431 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:49:06.501496 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0206 06:49:06.501581 62530 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0206 06:49:06.501599 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0206 06:49:06.501637 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0206 06:49:06.501677 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0206 06:49:06.501722 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0206 06:49:06.501734 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0206 06:49:06.501760 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0206 06:49:06.501833 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (3.04s) === RUN TestLifecycleComplex I0206 06:49:06.502321 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:06.502461 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:06.502500 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:06.502539 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:06.502577 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:06.502627 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:06.502668 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:06.502699 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:06.502740 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:06.502770 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0206 06:49:06.543441 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:06.547657 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:06.547749 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:07.816619 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:08.012744 62530 iamrole.go:89] ListRoles: { } I0206 06:49:08.014918 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:49:08.015316 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0206 06:49:08.015422 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0206 06:49:08.015517 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0206 06:49:08.015727 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:08.015889 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:08.015942 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.015959 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0206 06:49:08.016031 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:08.016076 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] } I0206 06:49:08.016163 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:08.016322 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:08.016380 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:08.016331 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:08.017130 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.017308 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.017435 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:49:08.017474 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:49:08.017505 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } W0206 06:49:08.017552 62530 api.go:53] PageSize not implemented I0206 06:49:08.017558 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:08.018378 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:08.018694 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:08.018829 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.019000 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.019125 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:08.020198 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:49:08.020342 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:08.020470 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:08.020448 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:08.020540 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0206 06:49:08.020636 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:08.020621 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:08.020723 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0206 06:49:08.020695 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tls-complex-example-com-5nursn" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0206 06:49:08.020844 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0206 06:49:08.020827 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.020865 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.timeout_seconds", Value: "30" },{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:08.021016 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:08.021176 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "Name", Value: "tcp-complex-example-com-vpjolq" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0206 06:49:08.021169 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:08.021301 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:08.021102 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0206 06:49:08.021393 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:08.021461 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:49:08.021542 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:08.021761 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.021991 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.021993 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0206 06:49:08.022223 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:08.022327 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:08.022381 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.022503 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:08.022564 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.022677 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:08.022767 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:08.022850 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0206 06:49:08.023022 62530 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0206 06:49:08.023104 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:08.022778 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0206 06:49:08.023153 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:49:08.023241 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:49:08.023279 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.023370 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:08.023412 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0206 06:49:08.023522 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0206 06:49:08.023623 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:08.023726 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:08.023862 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0206 06:49:08.023986 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0206 06:49:08.024047 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0206 06:49:08.024193 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:08.024252 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:08.024298 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:08.024353 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:08.024393 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:08.024451 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:08.024488 62530 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0206 06:49:08.024543 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:08.024593 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] } I0206 06:49:08.024722 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:49:08.024931 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.025157 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:08.025316 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:08.025365 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:49:08.025487 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0206 06:49:08.025675 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0206 06:49:08.025860 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ] }] } I0206 06:49:08.026091 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0206 06:49:08.026299 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.026461 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.026615 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:08.026684 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:08.026751 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:08.026823 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:08.026892 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-2", TransitGatewayId: "tgw-0123456" } I0206 06:49:08.027066 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0206 06:49:08.027248 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.027477 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.027655 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:08.027725 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0206 06:49:08.027813 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.027969 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0206 06:49:08.028131 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-2", TransitGatewayId: "tgw-123456" } I0206 06:49:08.028176 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:08.028214 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.028356 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0206 06:49:08.028444 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0206 06:49:08.028533 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" } ] }] } I0206 06:49:08.028675 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0206 06:49:08.028715 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:08.028810 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0206 06:49:08.028941 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0206 06:49:08.028952 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.029087 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0206 06:49:08.029174 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" } ] }] } I0206 06:49:08.029320 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0206 06:49:08.029403 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:08.029445 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" } ] }] } I0206 06:49:08.029577 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0206 06:49:08.029719 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0206 06:49:08.029810 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0206 06:49:08.029898 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0206 06:49:08.029931 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0206 06:49:08.030091 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:49:08.030142 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:08.030206 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:49:08.030290 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:08.030374 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:08.030322 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:08.030506 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0206 06:49:08.030555 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0206 06:49:08.030490 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-1" }], Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ], Type: "network" } I0206 06:49:08.030601 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:08.030655 62530 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0206 06:49:08.030746 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0206 06:49:08.030816 62530 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:08.030889 62530 api.go:53] PageSize not implemented I0206 06:49:08.030934 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:49:08.031011 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:08.031068 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:08.031007 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:08.031095 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:08.031166 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:08.031119 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:08.031189 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:08.031268 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:08.031279 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:08.031403 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:08.036990 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:49:08.037205 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:08.037339 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:08.037439 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:08.037602 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:08.038128 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:49:08.038378 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:49:08.038665 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:49:08.038718 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:08.038755 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:08.038821 62530 dns.go:235] Pre-creating DNS records I0206 06:49:08.038848 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:08.046929 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:08.051171 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:08.051268 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.351215 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:09.557399 62530 iamrole.go:89] ListRoles: { } I0206 06:49:09.559184 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:49:09.559418 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.559698 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.560331 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0206 06:49:09.560633 62530 api.go:53] PageSize not implemented I0206 06:49:09.560621 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:09.560832 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.560994 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:09.561112 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:09.561157 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:09.561216 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:09.561310 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:09.561373 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.561489 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:09.562734 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:49:09.562878 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.562956 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:09.563007 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:09.563059 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:09.563097 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:09.563110 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:09.563136 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:09.563184 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:09.563166 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:09.563263 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:09.563292 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:09.563195 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:09.563402 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:09.563537 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:09.563581 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0206 06:49:09.563707 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:09.563790 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.563908 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:09.563941 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:09.564056 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:09.564099 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:09.564230 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:09.564281 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.564459 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:09.564557 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.564873 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:49:09.565145 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:09.565270 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:09.565442 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:09.565538 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:09.565685 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.565848 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:09.566251 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:09.566470 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:09.566621 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:49:09.566710 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:09.566777 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:09.566799 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.566709 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:09.566838 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.566880 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:09.566923 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:09.566957 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:09.566989 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:09.567096 62530 api.go:53] PageSize not implemented I0206 06:49:09.567147 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:49:09.567225 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:09.567242 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0206 06:49:09.567311 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0206 06:49:09.567316 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:09.567339 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:09.567446 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:09.567354 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.567580 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:09.567662 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:09.567695 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.567773 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:09.567812 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.567870 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:09.567897 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:09.577609 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:49:09.577792 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.577989 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.578195 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.578370 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.579131 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:49:09.579384 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:49:09.579783 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0206 06:49:09.586872 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:09.590418 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:09.602473 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:09.606563 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:09.606660 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:10.849321 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:11.057163 62530 iamrole.go:89] ListRoles: { } I0206 06:49:11.059309 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:49:11.060176 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.060562 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:11.060691 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:11.060807 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.061002 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:11.061066 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } W0206 06:49:11.061192 62530 api.go:53] PageSize not implemented I0206 06:49:11.061145 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:11.061336 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0206 06:49:11.061480 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.061723 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:11.061817 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:11.061998 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:11.063504 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:49:11.063728 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:11.063840 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:11.063800 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:11.063890 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:11.063936 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:11.063970 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:11.063882 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:11.064011 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:11.064074 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:11.064109 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:11.064152 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.064379 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.064528 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:11.064630 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0206 06:49:11.064762 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:11.064858 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.065008 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:11.065053 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:11.065128 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:11.065257 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.065356 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:11.065397 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:11.065515 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:11.065567 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:11.065744 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:11.065858 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:49:11.066022 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:11.066184 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:11.066431 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:11.066625 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:11.066817 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:11.066962 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:11.067130 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:11.067406 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:11.067698 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:49:11.067814 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:11.067826 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:11.067922 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:11.067952 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.068011 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.068049 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:11.068089 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:11.068125 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:11.068159 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:11.068328 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0206 06:49:11.068364 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:11.068396 62530 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0206 06:49:11.068428 62530 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0206 06:49:11.068460 62530 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0206 06:49:11.068556 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0206 06:49:11.068631 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.068667 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0206 06:49:11.068708 62530 api.go:53] PageSize not implemented I0206 06:49:11.068770 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:49:11.068838 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:11.068915 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:11.068900 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:11.068949 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.069020 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:11.069045 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:11.069124 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:11.069161 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:11.069170 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.069236 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:11.069310 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:11.069337 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.069440 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:11.069487 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:11.074929 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:49:11.075061 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:11.075244 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:11.075344 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:11.075552 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:11.076506 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:49:11.076780 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:49:11.077051 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0206 06:49:11.077129 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:11.077167 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:11.077235 62530 dns.go:235] Pre-creating DNS records I0206 06:49:11.085077 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:11.089277 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:11.089373 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.372756 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:12.577448 62530 iamrole.go:89] ListRoles: { } I0206 06:49:12.579581 62530 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0206 06:49:12.579908 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:12.579927 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:12.580073 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:12.580175 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:12.580388 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.581277 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.581628 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0206 06:49:12.581903 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } W0206 06:49:12.582022 62530 api.go:53] PageSize not implemented I0206 06:49:12.582227 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.582345 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:12.582374 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:12.582446 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:12.583482 62530 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0206 06:49:12.583593 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:12.583796 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:12.583912 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:12.583991 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:12.584032 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:12.584035 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:12.584093 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:12.583992 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:12.584145 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:12.584179 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:12.584232 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:12.584277 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:12.584302 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:12.584455 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.584682 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.584892 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.585116 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:12.585193 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.585350 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:12.585476 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:12.585591 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:12.585805 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.585962 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:12.586080 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:12.586150 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:12.586484 62530 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0206 06:49:12.586694 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:12.586943 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.587179 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:12.587256 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:12.587416 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:12.587697 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:12.587818 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:12.587929 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:12.588239 62530 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0206 06:49:12.588354 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:12.588354 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:12.588497 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:12.588528 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.588582 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.588619 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:12.588658 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:12.588693 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:12.588725 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:12.588816 62530 api.go:53] PageSize not implemented I0206 06:49:12.588878 62530 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0206 06:49:12.588963 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:12.589041 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:12.588990 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:12.589102 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:12.589067 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.589145 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:12.589247 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:12.589276 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:12.589367 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:12.589399 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.589542 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:12.589598 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.589674 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:12.589701 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:12.595108 62530 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0206 06:49:12.595220 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.595437 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.595647 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.595855 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.596592 62530 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0206 06:49:12.596959 62530 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0206 06:49:12.597204 62530 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0206 06:49:12.600609 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:12.608585 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:12.621694 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:12.625829 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:12.625924 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:13.894676 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:14.098315 62530 iamrole.go:89] ListRoles: { } I0206 06:49:14.100596 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0206 06:49:14.100828 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0206 06:49:14.101226 62530 api.go:53] PageSize not implemented I0206 06:49:14.101147 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:14.101378 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.101448 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:14.102172 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:14.102330 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.102508 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:14.102900 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:14.103019 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:14.103233 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.103344 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:14.103389 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:14.103466 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:14.104339 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:14.104463 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:14.104485 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:14.104563 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:14.104584 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.104642 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:14.104658 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:14.104687 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:14.104772 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:14.104896 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:14.104886 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:14.104967 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:14.105004 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:14.104980 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:14.105100 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:14.105195 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.105356 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:14.105403 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.105539 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.105668 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:14.105827 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:14.105892 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.106033 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:14.106195 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:14.106243 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:14.106324 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:14.106424 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:14.106596 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:14.106866 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:14.107059 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:14.107230 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:14.107357 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:14.107447 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:14.107539 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:14.107652 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:14.107968 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:14.108052 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:14.108053 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:14.108161 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:14.108188 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.108245 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.108289 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:14.108331 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:14.108366 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:14.108399 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:14.108487 62530 api.go:53] PageSize not implemented I0206 06:49:14.108549 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:14.108594 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:14.108654 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:14.108630 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:14.108674 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:14.108723 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:14.108729 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:14.108739 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.108764 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:14.108845 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:14.108857 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.108969 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:14.109038 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.109179 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:14.109227 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:14.114555 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:14.114760 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.114939 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.115114 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.115348 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.116152 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.116231 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.116434 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:14.116685 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:14.116958 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:14.117012 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:14.117092 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:14.117180 62530 dns.go:235] Pre-creating DNS records I0206 06:49:14.125281 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:14.129575 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:14.129676 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.399968 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:15.600494 62530 iamrole.go:89] ListRoles: { } I0206 06:49:15.602741 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run W0206 06:49:15.603081 62530 api.go:53] PageSize not implemented I0206 06:49:15.603290 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.603493 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:15.603626 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:15.603680 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:15.603790 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:15.603858 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.603942 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:15.603894 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:15.603965 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:15.604052 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.604231 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.604362 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:15.604409 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:15.605394 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:15.605542 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:15.605540 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:15.605728 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:15.605697 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:15.605627 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:15.605864 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:15.605821 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:15.605884 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:15.605918 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:15.605963 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:15.606032 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:15.606065 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:15.606069 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:15.606145 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.606289 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.606423 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:15.606509 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:15.606665 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:15.606747 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.606893 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:15.606942 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:15.607158 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0206 06:49:15.607311 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:15.607361 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:15.607525 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:15.607621 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:15.607778 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:15.607939 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:15.608096 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0206 06:49:15.608284 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:15.608393 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:15.608707 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:15.608851 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:15.609040 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:15.609266 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:15.609343 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:15.609364 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:15.609438 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:15.609459 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.609509 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.609547 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:15.609588 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:15.609624 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:15.609656 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:15.609752 62530 api.go:53] PageSize not implemented I0206 06:49:15.609800 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:15.609871 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:15.609882 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:15.609950 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:15.609951 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:15.609966 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:15.609976 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.610029 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:15.610123 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:15.610166 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.610258 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:15.610288 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.610342 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:15.610431 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:15.610448 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:15.616182 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:15.616334 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.616514 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.616640 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.616812 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.617384 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:15.617692 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:15.617938 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0206 06:49:15.622816 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:15.626323 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.626407 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.636096 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:15.640231 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.640320 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:15.640395 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:16.937552 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:17.139097 62530 iamrole.go:89] ListRoles: { } I0206 06:49:17.141166 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0206 06:49:17.141530 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:17.141745 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:17.141889 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.142065 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:17.142176 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.142319 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:17.142670 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.143195 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:17.143229 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:17.143286 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:17.143368 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } W0206 06:49:17.143512 62530 api.go:53] PageSize not implemented I0206 06:49:17.143559 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:17.143757 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.145618 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:17.145737 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:17.145919 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:17.145868 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:17.145876 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0206 06:49:17.146028 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:17.146004 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:17.146101 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:17.146161 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:17.146076 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:17.146228 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:17.146293 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:17.146309 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:17.146356 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:17.146550 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:17.146616 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.146766 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:17.146810 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.146939 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.147092 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:17.147168 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.147356 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:17.147528 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:17.147584 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:17.147674 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:17.147741 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:17.147859 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:17.148022 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:17.148134 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:17.148328 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:17.148458 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:17.148855 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:17.149106 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:17.149281 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:17.149392 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:17.149586 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:17.149695 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0206 06:49:17.149711 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0206 06:49:17.149771 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:17.149854 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.149902 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.149940 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:17.149979 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:17.150013 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:17.150045 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:17.150139 62530 api.go:53] PageSize not implemented I0206 06:49:17.150187 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:17.150268 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:17.150338 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:17.150259 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:17.150392 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:17.150373 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.150422 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:17.150485 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:17.150465 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:17.150534 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:17.150558 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.150660 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:17.150692 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.150750 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:17.150776 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:17.156153 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:17.156269 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.156434 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.156587 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.156772 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.157376 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:17.157704 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:17.157957 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:17.158013 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:17.158055 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:17.158125 62530 dns.go:235] Pre-creating DNS records I0206 06:49:17.166202 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:17.170429 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.170526 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:17.170583 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.394337 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:18.596995 62530 iamrole.go:89] ListRoles: { } I0206 06:49:18.598902 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0206 06:49:18.599113 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:18.599279 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.599419 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0206 06:49:18.599502 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:18.599529 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:18.599575 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:18.599700 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } W0206 06:49:18.599857 62530 api.go:53] PageSize not implemented I0206 06:49:18.599896 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:18.600202 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.600454 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:18.600683 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:18.601038 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:18.601200 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.602043 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:18.602254 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:18.602184 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.602329 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:18.602255 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:18.602333 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.602389 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:18.602493 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:18.602507 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:18.602536 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:18.602596 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:18.602590 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:18.602627 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:18.602672 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:18.602826 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:18.602883 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:18.602965 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:18.603092 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:18.603134 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.603255 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.603369 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.603475 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:18.603513 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:18.603638 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:18.603713 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:18.603850 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:18.604161 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:18.604333 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:18.604470 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:18.604667 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:18.604773 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:18.604963 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:18.605329 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:18.605441 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:18.605583 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:18.605874 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:18.605984 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:18.606082 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:18.606170 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:18.606190 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.606237 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.606278 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:18.606318 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:18.606351 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:18.606383 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:18.606482 62530 api.go:53] PageSize not implemented I0206 06:49:18.606545 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:18.606624 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0206 06:49:18.606626 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:49:18.606699 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:18.606715 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:18.606719 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:18.606788 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:18.606737 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.606908 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:18.606963 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.607044 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:18.607098 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:18.607119 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.607205 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:18.607244 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:18.612656 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:18.612894 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.613079 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.613200 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.613376 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.614006 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:18.614266 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:18.614592 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0206 06:49:18.617710 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:18.621205 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.621294 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.621345 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.635133 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:18.639465 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.639595 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.639682 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:18.639760 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:19.888099 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:20.085637 62530 iamrole.go:89] ListRoles: { } I0206 06:49:20.087209 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0206 06:49:20.088136 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:20.088307 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:20.088582 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:20.088587 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:20.088762 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.088974 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0206 06:49:20.089148 62530 api.go:53] PageSize not implemented I0206 06:49:20.089112 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.089318 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:20.089410 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:20.089478 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:20.089632 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:20.089744 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:20.089801 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.091973 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:20.092138 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:20.092312 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:20.092227 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:20.092394 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:20.092416 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:20.092368 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.092446 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:20.092549 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:20.092552 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:20.092600 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:20.092653 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:20.092685 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:20.092757 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.092910 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.093045 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:20.093137 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0206 06:49:20.093296 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:20.093344 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:20.093500 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:20.093550 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:20.093669 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:20.093775 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.093934 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:20.093986 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:20.094154 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:20.094357 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:20.094579 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:20.094676 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:20.094772 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:20.094985 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:20.095143 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:20.095813 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:20.096056 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:20.096172 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:20.096472 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:20.096587 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:20.096590 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:20.096738 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:20.096771 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.096826 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.096863 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:20.096905 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:20.096941 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:20.096974 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:20.097095 62530 api.go:53] PageSize not implemented I0206 06:49:20.097162 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:20.097247 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:20.097327 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:20.097271 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:20.097392 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:20.097352 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.097434 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:20.097535 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:20.097567 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:20.097654 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:20.097685 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.097832 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:20.097890 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.097979 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:20.098027 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:20.108073 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:20.108223 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.108479 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.108694 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.108932 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.109882 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:20.110314 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:20.110660 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:20.110720 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:20.110758 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:20.110830 62530 dns.go:235] Pre-creating DNS records I0206 06:49:20.119456 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0206 06:49:20.123731 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.123837 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.123925 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:20.123978 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.355617 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:21.527161 62530 iamrole.go:89] ListRoles: { } I0206 06:49:21.528494 62530 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0206 06:49:21.528774 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0206 06:49:21.528925 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.529135 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0206 06:49:21.529631 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0206 06:49:21.530380 62530 api.go:53] PageSize not implemented I0206 06:49:21.531615 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0206 06:49:21.531762 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0206 06:49:21.532574 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0206 06:49:21.532780 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.533157 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.533606 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.533769 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:21.533825 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:21.533894 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:21.537323 62530 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0206 06:49:21.537536 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:21.537706 62530 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:21.537737 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0206 06:49:21.538026 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:21.538107 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:21.538239 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.538412 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0206 06:49:21.538545 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0206 06:49:21.538633 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:21.538605 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:21.538686 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:21.538678 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } I0206 06:49:21.538712 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0206 06:49:21.538787 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0206 06:49:21.538866 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:21.538878 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:21.538908 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } I0206 06:49:21.538937 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] }] } I0206 06:49:21.539050 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.539157 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0206 06:49:21.539277 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:21.539369 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.539493 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:21.539536 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:21.539577 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:21.539768 62530 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0206 06:49:21.539974 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:21.540114 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:21.540242 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:21.540639 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:21.540796 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:21.540920 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.541074 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0206 06:49:21.541118 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:21.541393 62530 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0206 06:49:21.541480 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:21.541476 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:21.541584 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:21.541604 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.541648 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.541684 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:21.541723 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4"] } I0206 06:49:21.541756 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5"] } I0206 06:49:21.541788 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0206 06:49:21.541874 62530 api.go:53] PageSize not implemented I0206 06:49:21.541926 62530 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0206 06:49:21.542002 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:21.542027 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:21.542077 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:21.542080 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:21.542107 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:21.542167 62530 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0206 06:49:21.542095 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.542297 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:21.542356 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.542440 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:21.542498 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:21.542523 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.542621 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0206 06:49:21.542675 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.548313 62530 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0206 06:49:21.548518 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.548693 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.548896 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.549086 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.549875 62530 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0206 06:49:21.550125 62530 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0206 06:49:21.550404 62530 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0206 06:49:21.550601 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:21.550660 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:21.550700 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:21.550737 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:21.550769 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:21.550802 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:21.550834 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:21.550871 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:21.550913 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:21.550953 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:21.550988 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:21.551021 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:21.551057 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:21.551089 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:21.551131 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:21.551167 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:21.551203 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:21.551239 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:21.551276 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:21.551308 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:21.551344 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0206 06:49:21.551384 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:21.551417 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:21.551451 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:21.551488 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:21.551525 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:21.551561 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:21.554257 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:21.554327 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:21.554350 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:21.554385 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554441 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0206 06:49:21.554518 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554579 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554626 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554681 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554724 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554768 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0206 06:49:21.554834 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554908 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0206 06:49:21.554950 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0206 06:49:21.555003 62530 api.go:53] PageSize not implemented I0206 06:49:21.555022 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:21.555045 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:21.555061 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0206 06:49:21.555098 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:21.555121 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:21.555138 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" ] } I0206 06:49:21.555216 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:21.555252 62530 iamrole.go:89] ListRoles: { } I0206 06:49:21.555296 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:21.555323 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:21.555381 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:21.555428 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:21.555470 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0206 06:49:21.556023 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } I0206 06:49:21.556046 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } volume:vol-1 ok autoscaling-config:lt-2 ok I0206 06:49:21.556111 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } autoscaling-group:nodes.complex.example.com ok I0206 06:49:21.556149 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } autoscaling-group:master-us-test-1a.masters.complex.example.com ok iam-instance-profile:nodes.complex.example.com ok I0206 06:49:21.556166 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/5 ok I0206 06:49:21.556186 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0206 06:49:21.556236 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } volume:vol-2 ok I0206 06:49:21.556242 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0206 06:49:21.556270 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } subnet:subnet-3 ok iam-instance-profile:masters.complex.example.com ok I0206 06:49:21.556286 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0206 06:49:21.556099 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.complex.example.com ok I0206 06:49:21.556303 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/4 ok I0206 06:49:21.556343 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 } ] } W0206 06:49:21.556696 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:21.556720 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:21.556765 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0206 06:49:21.556820 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:49:21.556884 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0206 06:49:21.556918 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:21.556968 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-1 ok I0206 06:49:21.557011 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:21.557081 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0206 06:49:21.557304 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:21.557318 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:21.557409 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0206 06:49:21.557457 62530 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0206 06:49:21.557473 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0206 06:49:21.557446 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0206 06:49:21.557506 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } subnet:subnet-1 ok iam-role:masters.complex.example.com ok I0206 06:49:21.557539 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0206 06:49:21.557580 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0206 06:49:21.557602 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0206 06:49:21.557571 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } I0206 06:49:21.557630 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } route-table:rtb-2 ok iam-role:nodes.complex.example.com ok I0206 06:49:21.557734 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:21.557823 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:49:21.557901 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (15.06s) === RUN TestLifecycleExternalLB I0206 06:49:21.558389 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:21.558532 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:21.558570 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:21.558611 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:21.558654 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:21.558704 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:21.558744 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:21.558776 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:21.558814 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:21.558840 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0206 06:49:21.584745 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:21.588005 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:21.588103 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:22.815651 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:22.996402 62530 iamrole.go:89] ListRoles: { } I0206 06:49:22.998052 62530 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0206 06:49:22.998365 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:22.998585 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0206 06:49:22.998610 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0206 06:49:22.998697 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0206 06:49:22.998718 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:49:22.998748 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0206 06:49:22.998763 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } W0206 06:49:22.998739 62530 api.go:53] PageSize not implemented I0206 06:49:22.998938 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:22.998932 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:22.999010 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0206 06:49:22.999059 62530 api.go:53] PageSize not implemented I0206 06:49:22.999002 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0206 06:49:22.999041 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:22.999080 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:22.999167 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0206 06:49:22.999155 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] } I0206 06:49:22.999299 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0206 06:49:22.999296 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0206 06:49:22.999373 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0206 06:49:22.999420 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0206 06:49:22.999339 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:22.999387 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0206 06:49:22.999441 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:22.999542 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } W0206 06:49:22.999595 62530 api.go:53] PageSize not implemented I0206 06:49:22.999610 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:22.999834 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:23.000041 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:23.000108 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:23.000329 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:23.000551 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" }] }] } I0206 06:49:23.000718 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" }] }] } I0206 06:49:23.000831 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:23.001392 62530 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0206 06:49:23.001593 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0206 06:49:23.001551 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:23.001689 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0206 06:49:23.001785 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0206 06:49:23.001852 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:23.001860 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0206 06:49:23.001994 62530 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0206 06:49:23.002039 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0206 06:49:23.002051 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0206 06:49:23.002168 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:23.002293 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], VpcId: "vpc-1" } I0206 06:49:23.002245 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0206 06:49:23.002470 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:23.002570 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:23.002560 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0206 06:49:23.002618 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:23.002698 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:23.002750 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:23.002794 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:23.002870 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:23.002994 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:49:23.003047 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "masters.externallb.example.com" }] }], VpcId: "vpc-1" } I0206 06:49:23.003144 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.003232 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:23.003280 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" } ] } I0206 06:49:23.003364 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:49:23.003409 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:23.003457 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:23.003508 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:23.003671 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0206 06:49:23.006883 62530 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0206 06:49:23.007009 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:23.007194 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:23.007282 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:23.008290 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:23.008531 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.008976 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0206 06:49:23.009255 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:23.009512 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.009772 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0206 06:49:23.010087 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" }] }] } I0206 06:49:23.010400 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.010729 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.010989 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" }] }] } I0206 06:49:23.011333 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.012277 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:49:23.012451 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.012596 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0206 06:49:23.012727 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0206 06:49:23.013579 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:23.013629 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:23.013751 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0206 06:49:23.013894 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:23.013996 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:23.014088 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:49:23.014181 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:23.014772 62530 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0206 06:49:23.015038 62530 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0206 06:49:23.015292 62530 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0206 06:49:23.015335 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:23.015371 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:23.015443 62530 dns.go:235] Pre-creating DNS records I0206 06:49:23.015474 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:23.022794 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:23.026025 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:23.026123 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.299247 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:24.482832 62530 iamrole.go:89] ListRoles: { } I0206 06:49:24.484120 62530 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0206 06:49:24.485418 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0206 06:49:24.485581 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.485716 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0206 06:49:24.485745 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:24.485797 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:24.485813 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0206 06:49:24.485852 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:24.485971 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:24.486070 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:24.486116 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0206 06:49:24.486326 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0206 06:49:24.486357 62530 api.go:53] PageSize not implemented I0206 06:49:24.487057 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] }] } W0206 06:49:24.487409 62530 api.go:53] PageSize not implemented W0206 06:49:24.487683 62530 api.go:53] PageSize not implemented I0206 06:49:24.487598 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] }] } I0206 06:49:24.487743 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0206 06:49:24.487865 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0206 06:49:24.487906 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0206 06:49:24.487922 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.488113 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:24.491383 62530 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0206 06:49:24.491539 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0206 06:49:24.491746 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:24.491862 62530 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0206 06:49:24.491814 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.491949 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0206 06:49:24.491974 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:24.492023 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0206 06:49:24.492236 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:24.492399 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.492573 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:24.492682 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.492856 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:24.497821 62530 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0206 06:49:24.497986 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.498141 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:24.498315 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.498449 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.498666 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.499002 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:24.499147 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:24.499536 62530 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0206 06:49:24.499783 62530 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0206 06:49:24.500039 62530 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0206 06:49:24.503170 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:24.503239 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:24.503279 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:24.503337 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:24.503376 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:24.503423 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:24.503459 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:24.503512 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:24.503553 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:24.503613 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:24.503667 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:24.503736 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:24.503771 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:24.503814 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:24.503867 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:24.503927 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:24.503972 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:24.504018 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:24.504058 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:24.504101 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:24.504142 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:24.504189 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:24.504244 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:24.504301 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:24.505681 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:24.505758 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:24.505781 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:24.505831 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.505894 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0206 06:49:24.505961 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506045 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506095 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506182 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506237 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506299 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0206 06:49:24.506357 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506431 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0206 06:49:24.506478 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0206 06:49:24.506555 62530 api.go:53] PageSize not implemented I0206 06:49:24.506579 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:24.506608 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:24.506635 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:24.506663 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:24.506680 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0206 06:49:24.506757 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:24.506807 62530 iamrole.go:89] ListRoles: { } I0206 06:49:24.506864 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:24.506910 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:24.506976 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:24.507050 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:24.507104 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-2 ok autoscaling-group:nodes.externallb.example.com ok I0206 06:49:24.507609 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:24.507697 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok I0206 06:49:24.507780 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0206 06:49:24.507678 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0206 06:49:24.507840 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:24.507818 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0206 06:49:24.507863 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0206 06:49:24.507866 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:24.507717 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.externallb.example.com. ok I0206 06:49:24.507916 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:24.507975 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0206 06:49:24.508191 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:24.508215 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:24.508269 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:24.508341 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:49:24.508424 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok I0206 06:49:24.508496 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0206 06:49:24.508566 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0206 06:49:24.508683 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0206 06:49:24.508745 62530 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0206 06:49:24.508716 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:49:24.508763 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0206 06:49:24.508805 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0206 06:49:24.508849 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0206 06:49:24.508904 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0206 06:49:24.508924 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0206 06:49:24.508953 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0206 06:49:24.509026 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:24.509128 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:49:24.509237 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (2.95s) === RUN TestLifecycleSharedSubnet I0206 06:49:24.509770 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:24.509932 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:24.509985 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:24.510035 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:24.510086 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:24.510148 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:24.510200 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:24.510249 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:24.510301 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:24.510329 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0206 06:49:24.535914 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:24.539245 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:24.539334 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.786667 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:25.970529 62530 iamrole.go:89] ListRoles: { } I0206 06:49:25.971866 62530 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0206 06:49:25.972197 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0206 06:49:25.972300 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] } I0206 06:49:25.972538 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0206 06:49:25.972680 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0206 06:49:25.972832 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:25.973061 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.973403 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:25.973661 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:25.973848 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:25.974239 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:25.974318 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:25.974347 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:25.974409 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:25.974494 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] }] } I0206 06:49:25.974686 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:25.974826 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:25.976422 62530 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0206 06:49:25.976614 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0206 06:49:25.976596 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0206 06:49:25.976754 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0206 06:49:25.976843 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0206 06:49:25.976746 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:25.977003 62530 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0206 06:49:25.976931 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:25.977119 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:25.977205 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:25.977285 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0206 06:49:25.977515 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0206 06:49:25.977588 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0206 06:49:25.977818 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:25.977917 62530 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" } ] } I0206 06:49:25.978055 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:25.978199 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:25.978281 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:25.978889 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0206 06:49:25.982874 62530 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0206 06:49:25.983138 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.983389 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0206 06:49:25.983626 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" }] }] } I0206 06:49:25.983880 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.984029 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.984224 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:49:25.984446 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0206 06:49:25.984595 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.984787 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.984877 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.985146 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.985390 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.985633 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.985875 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.985989 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.986078 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.986346 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0206 06:49:25.986589 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0206 06:49:25.986863 62530 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0206 06:49:25.987223 62530 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0206 06:49:25.987516 62530 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0206 06:49:25.987576 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:25.987620 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:25.987705 62530 dns.go:235] Pre-creating DNS records I0206 06:49:25.987740 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:25.993593 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:25.997855 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:25.998455 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.304136 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:27.484278 62530 iamrole.go:89] ListRoles: { } I0206 06:49:27.485163 62530 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0206 06:49:27.485367 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:27.485445 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:27.485485 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:27.486779 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:27.488401 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] }] } I0206 06:49:27.488610 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.489105 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:27.494912 62530 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0206 06:49:27.495122 62530 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0206 06:49:27.495073 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0206 06:49:27.495233 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0206 06:49:27.495361 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:27.495469 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:27.495629 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0206 06:49:27.495796 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0206 06:49:27.495988 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:27.501097 62530 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0206 06:49:27.501275 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.501452 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.501702 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.501866 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.502621 62530 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0206 06:49:27.502805 62530 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0206 06:49:27.503021 62530 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0206 06:49:27.505755 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:27.505823 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:27.505860 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:27.505893 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:27.505927 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:27.505961 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:27.505996 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:27.506035 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:27.506077 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:27.506110 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:27.506143 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:27.506176 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:27.506210 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:27.506245 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:27.506281 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:27.506313 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:27.506345 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:27.506380 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:27.506416 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:27.507811 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:27.507878 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:27.507900 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:27.507942 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.507990 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0206 06:49:27.508044 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508101 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508142 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508186 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508230 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508268 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0206 06:49:27.508310 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508358 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0206 06:49:27.508394 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0206 06:49:27.508443 62530 api.go:53] PageSize not implemented I0206 06:49:27.508466 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:27.508492 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:27.508513 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:27.508538 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:27.508557 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:27.508608 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:27.508650 62530 iamrole.go:89] ListRoles: { } I0206 06:49:27.508695 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:27.508726 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:27.508772 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:27.508822 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:27.509170 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok autoscaling-config:lt-2 ok autoscaling-group:nodes.sharedsubnet.example.com ok I0206 06:49:27.509274 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:27.509253 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0206 06:49:27.509331 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0206 06:49:27.509465 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:27.509468 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } iam-instance-profile:nodes.sharedsubnet.example.com ok I0206 06:49:27.509485 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:27.509349 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedsubnet.example.com. ok I0206 06:49:27.509524 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0206 06:49:27.509546 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:27.509590 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok I0206 06:49:27.509614 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0206 06:49:27.509811 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:27.509831 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:27.509865 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:27.509921 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0206 06:49:27.510016 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0206 06:49:27.510072 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0206 06:49:27.510159 62530 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0206 06:49:27.510183 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0206 06:49:27.510221 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok I0206 06:49:27.510275 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0206 06:49:27.510309 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0206 06:49:27.510381 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (3.00s) === RUN TestLifecyclePrivateSharedSubnet I0206 06:49:27.510870 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:27.511021 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:27.511061 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:27.511103 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:27.511144 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:27.511192 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:27.511234 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:27.511264 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:27.511305 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:27.511333 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0206 06:49:27.540330 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:27.543893 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.543975 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:27.544036 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:28.823283 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:29.013279 62530 iamrole.go:89] ListRoles: { } I0206 06:49:29.015203 62530 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0206 06:49:29.015593 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0206 06:49:29.015745 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0206 06:49:29.016175 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:29.016451 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.016790 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:29.017015 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:29.017208 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:29.017550 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] }] } I0206 06:49:29.017726 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:29.017892 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:29.018270 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0206 06:49:29.018377 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0206 06:49:29.018391 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:29.018730 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:29.018814 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:29.018845 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:29.019280 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0206 06:49:29.019380 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0206 06:49:29.019813 62530 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0206 06:49:29.019915 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0206 06:49:29.019978 62530 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0206 06:49:29.020018 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:29.020059 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0206 06:49:29.020205 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:29.020199 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0206 06:49:29.020298 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0206 06:49:29.020335 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0206 06:49:29.020437 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0206 06:49:29.020580 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0206 06:49:29.020285 62530 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" },{ Key: "kubernetes.io/role/elb", Value: "1" }] } I0206 06:49:29.021266 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0206 06:49:29.020319 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0206 06:49:29.021540 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0206 06:49:29.021597 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:29.021737 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0206 06:49:29.022099 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0206 06:49:29.022192 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0206 06:49:29.022248 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0206 06:49:29.022345 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0206 06:49:29.022494 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0206 06:49:29.022736 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:29.022856 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:29.022977 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:29.023238 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:29.023366 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:29.023580 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0206 06:49:29.023900 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:29.024093 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:29.024248 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:29.024470 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:49:29.025067 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:29.025134 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:29.025188 62530 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0206 06:49:29.025361 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0206 06:49:29.026669 62530 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0206 06:49:29.026881 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:29.026975 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:29.026985 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:49:29.027176 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0206 06:49:29.027318 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } W0206 06:49:29.027460 62530 api.go:53] PageSize not implemented I0206 06:49:29.027408 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } I0206 06:49:29.027387 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } W0206 06:49:29.027535 62530 api.go:53] PageSize not implemented I0206 06:49:29.027604 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:29.027701 62530 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0206 06:49:29.027657 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0206 06:49:29.027769 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:29.027819 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.027909 62530 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0206 06:49:29.027990 62530 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0206 06:49:29.028046 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.028145 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.028284 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.028427 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.028611 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0206 06:49:29.028827 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:49:29.028929 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:49:29.029062 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.029193 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" }] }] } I0206 06:49:29.029375 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.029512 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.029643 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.029780 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.029905 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.030038 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0206 06:49:29.030131 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" }] }] } I0206 06:49:29.030264 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.030436 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.030574 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0206 06:49:29.030699 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.030817 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0206 06:49:29.030949 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } I0206 06:49:29.031060 62530 executor.go:111] Tasks: 103 done / 123 total; 5 can run I0206 06:49:29.031134 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:49:29.031277 62530 api.go:53] PageSize not implemented I0206 06:49:29.031253 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:29.031345 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:29.031413 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:49:29.031528 62530 api.go:53] PageSize not implemented I0206 06:49:29.031515 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:29.031584 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:29.037550 62530 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0206 06:49:29.037800 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.037951 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.038103 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.038211 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.038865 62530 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0206 06:49:29.039117 62530 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0206 06:49:29.039386 62530 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0206 06:49:29.039439 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:29.039474 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:29.039540 62530 dns.go:235] Pre-creating DNS records I0206 06:49:29.039571 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:29.046036 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:29.049524 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.049611 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:29.049671 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.327749 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:30.518803 62530 iamrole.go:89] ListRoles: { } I0206 06:49:30.520791 62530 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0206 06:49:30.521039 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:30.521187 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:30.521234 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:30.521316 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.521709 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:30.522077 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:30.522391 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.524642 62530 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0206 06:49:30.524859 62530 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0206 06:49:30.525019 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0206 06:49:30.525183 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0206 06:49:30.525169 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0206 06:49:30.525187 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0206 06:49:30.525256 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0206 06:49:30.525267 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0206 06:49:30.525361 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0206 06:49:30.525370 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0206 06:49:30.525548 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:30.525606 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:30.525731 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0206 06:49:30.525884 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:30.525939 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:30.526038 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0206 06:49:30.526219 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:30.526290 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0206 06:49:30.526910 62530 executor.go:111] Tasks: 72 done / 123 total; 31 can run W0206 06:49:30.527211 62530 api.go:53] PageSize not implemented I0206 06:49:30.527248 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.527342 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.527385 62530 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0206 06:49:30.527434 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:30.527529 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:30.527558 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0206 06:49:30.527490 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.527604 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0206 06:49:30.527624 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.527646 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0206 06:49:30.527685 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0206 06:49:30.527720 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } W0206 06:49:30.527792 62530 api.go:53] PageSize not implemented I0206 06:49:30.527808 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.527873 62530 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0206 06:49:30.527989 62530 api.go:53] PageSize not implemented I0206 06:49:30.527966 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:30.528085 62530 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0206 06:49:30.528056 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.528123 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:49:30.528200 62530 api.go:53] PageSize not implemented I0206 06:49:30.528228 62530 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0206 06:49:30.528263 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.528469 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.528561 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.533986 62530 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0206 06:49:30.534234 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.534399 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.534492 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.534663 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.535139 62530 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0206 06:49:30.535256 62530 api.go:53] PageSize not implemented I0206 06:49:30.535282 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.535466 62530 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0206 06:49:30.535704 62530 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0206 06:49:30.538935 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:30.539001 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:30.539037 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:30.539073 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:30.539106 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:30.539139 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:30.539177 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:30.539215 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:30.539260 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0206 06:49:30.539297 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:30.539327 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:30.539360 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:30.539389 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:30.539426 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:30.539459 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:30.539495 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:49:30.539530 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:30.539567 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:30.539601 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:30.539633 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:30.539670 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:30.539706 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:30.541189 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:30.541259 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:30.541279 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:30.541318 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541374 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0206 06:49:30.541445 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541510 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541553 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541594 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541636 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541670 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0206 06:49:30.541706 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541751 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0206 06:49:30.541785 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0206 06:49:30.541831 62530 api.go:53] PageSize not implemented I0206 06:49:30.541848 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0206 06:49:30.541889 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:30.541916 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:30.541932 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0206 06:49:30.541970 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:30.541994 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:30.542011 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0206 06:49:30.542075 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:30.542116 62530 iamrole.go:89] ListRoles: { } I0206 06:49:30.542161 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:30.542190 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:30.542234 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:30.542282 62530 routetable.go:53] DescribeRouteTables: { } autoscaling-config:lt-1 ok I0206 06:49:30.542838 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok I0206 06:49:30.542847 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } autoscaling-config:lt-3 ok I0206 06:49:30.542921 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok I0206 06:49:30.542945 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0206 06:49:30.542974 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } iam-instance-profile:bastions.private-shared-subnet.example.com ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok autoscaling-group:nodes.private-shared-subnet.example.com ok I0206 06:49:30.542981 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:bastion.private-shared-subnet.example.com ok I0206 06:49:30.543029 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0206 06:49:30.543080 62530 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok I0206 06:49:30.543125 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0206 06:49:30.543166 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0206 06:49:30.543070 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } I0206 06:49:30.543211 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok W0206 06:49:30.543226 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:30.543245 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:30.543285 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0206 06:49:30.543167 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.private-shared-subnet.example.com ok I0206 06:49:30.543351 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0206 06:49:30.543552 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:30.543573 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0206 06:49:30.543616 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:30.543670 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-2 ok I0206 06:49:30.543756 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:30.543806 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0206 06:49:30.543925 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:30.543938 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:30.544018 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0206 06:49:30.544068 62530 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0206 06:49:30.544084 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0206 06:49:30.544070 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:30.544116 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok I0206 06:49:30.544152 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0206 06:49:30.544264 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:30.544284 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0206 06:49:30.544266 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0206 06:49:30.544338 62530 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0206 06:49:30.544355 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0206 06:49:30.544389 62530 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0206 06:49:30.544429 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0206 06:49:30.544511 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0206 06:49:30.544527 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0206 06:49:30.544560 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (3.03s) === RUN TestLifecyclePrivateSharedIP I0206 06:49:30.545043 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:30.545184 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:30.545222 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:30.545268 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:30.545307 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:30.545358 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:30.545398 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:30.545431 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:30.545469 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:30.545497 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0206 06:49:30.578263 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:30.581743 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.581840 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:30.581901 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:31.862101 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:32.037435 62530 iamrole.go:89] ListRoles: { } I0206 06:49:32.038820 62530 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0206 06:49:32.039365 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0206 06:49:32.039498 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0206 06:49:32.039478 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:32.039570 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" }] } I0206 06:49:32.039625 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:32.039664 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:32.039669 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.private-shared-ip.example.com" }] } I0206 06:49:32.039771 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.039921 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:32.039899 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:32.041593 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:32.041647 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0206 06:49:32.041687 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:32.041781 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0206 06:49:32.041913 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.042362 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.042592 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:32.042804 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:32.047545 62530 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0206 06:49:32.047699 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:32.047883 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0206 06:49:32.047836 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.047951 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0206 06:49:32.048133 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0206 06:49:32.048070 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0206 06:49:32.048116 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0206 06:49:32.048032 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0206 06:49:32.048233 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0206 06:49:32.048299 62530 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0206 06:49:32.048371 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0206 06:49:32.048415 62530 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0206 06:49:32.048474 62530 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0206 06:49:32.048405 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0206 06:49:32.048648 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:32.048754 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:32.048811 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:32.048717 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0206 06:49:32.048886 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0206 06:49:32.048860 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.048970 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0206 06:49:32.049039 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.049094 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-12345678" } I0206 06:49:32.049188 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:32.049234 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0206 06:49:32.049230 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0206 06:49:32.049309 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0206 06:49:32.049425 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:32.049517 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0206 06:49:32.049663 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:32.049776 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:32.049830 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0206 06:49:32.049963 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:32.050022 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:32.050063 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:32.050126 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:32.050166 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0206 06:49:32.050258 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:49:32.049934 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0206 06:49:32.050300 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:32.050450 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:32.050507 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:32.050565 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:32.050710 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:32.050705 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0206 06:49:32.050798 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:32.050842 62530 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0206 06:49:32.050958 62530 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0206 06:49:32.051047 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:32.051198 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:32.051245 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0206 06:49:32.051282 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:32.051368 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:32.051335 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0206 06:49:32.051458 62530 api.go:53] PageSize not implemented I0206 06:49:32.051438 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0206 06:49:32.051520 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:32.051471 62530 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.private-shared-ip.example.com" }], Type: "network" } I0206 06:49:32.051573 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:32.051646 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:32.051631 62530 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } I0206 06:49:32.051694 62530 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0206 06:49:32.051610 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:32.051789 62530 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-ip.example.com" }] } I0206 06:49:32.051862 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0206 06:49:32.051899 62530 api.go:53] PageSize not implemented I0206 06:49:32.051925 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:32.051805 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" }] }] } I0206 06:49:32.051969 62530 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0206 06:49:32.052066 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.052140 62530 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0206 06:49:32.052344 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0206 06:49:32.052484 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.052652 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0206 06:49:32.052786 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:32.052878 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.052998 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.053153 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.053377 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:32.053531 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-2" } I0206 06:49:32.053621 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.053849 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:49:32.053972 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.054132 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.054340 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0206 06:49:32.054414 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.054570 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.054655 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0206 06:49:32.054830 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.054998 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0206 06:49:32.055145 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.055307 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0206 06:49:32.055462 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-2" } I0206 06:49:32.055533 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0206 06:49:32.055655 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.055806 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" }] }] } I0206 06:49:32.055968 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.056115 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.056262 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.056414 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0206 06:49:32.056575 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0206 06:49:32.056690 62530 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0206 06:49:32.056749 62530 api.go:53] PageSize not implemented I0206 06:49:32.056794 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:32.056817 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:32.056903 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0206 06:49:32.056981 62530 api.go:53] PageSize not implemented I0206 06:49:32.056952 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:32.057004 62530 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:32.057061 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:32.057164 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:32.057203 62530 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0206 06:49:32.057368 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:49:32.057322 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:32.057444 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:32.057514 62530 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0206 06:49:32.062752 62530 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0206 06:49:32.062845 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:32.062989 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-1" } I0206 06:49:32.063045 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.063148 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.063234 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.063381 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.064205 62530 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0206 06:49:32.064468 62530 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0206 06:49:32.064759 62530 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0206 06:49:32.064810 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:32.064849 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:32.064917 62530 dns.go:235] Pre-creating DNS records I0206 06:49:32.064944 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:32.071579 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:32.075126 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.075214 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:32.075276 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.355893 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:33.545265 62530 iamrole.go:89] ListRoles: { } I0206 06:49:33.547334 62530 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0206 06:49:33.547690 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:33.547810 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0206 06:49:33.547963 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0206 06:49:33.548017 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0206 06:49:33.548106 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] }] } I0206 06:49:33.548489 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.548686 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:33.551413 62530 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0206 06:49:33.551566 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.551568 62530 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0206 06:49:33.551768 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0206 06:49:33.551812 62530 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0206 06:49:33.551741 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0206 06:49:33.551863 62530 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0206 06:49:33.551919 62530 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0206 06:49:33.551943 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:33.551960 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0206 06:49:33.552009 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0206 06:49:33.552150 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:33.552198 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0206 06:49:33.552350 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:33.552392 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.552551 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:33.552600 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.552728 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0206 06:49:33.552772 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0206 06:49:33.552872 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0206 06:49:33.553020 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:33.553081 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.553749 62530 executor.go:111] Tasks: 74 done / 132 total; 36 can run W0206 06:49:33.554070 62530 api.go:53] PageSize not implemented I0206 06:49:33.554102 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.554118 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:33.554205 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:33.554196 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.554011 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:33.554241 62530 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0206 06:49:33.554225 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0206 06:49:33.554375 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0206 06:49:33.554427 62530 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0206 06:49:33.554466 62530 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0206 06:49:33.554397 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:33.554502 62530 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } W0206 06:49:33.554592 62530 api.go:53] PageSize not implemented I0206 06:49:33.554615 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.554773 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:33.554933 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0206 06:49:33.555119 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0206 06:49:33.555229 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:33.555360 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.555572 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.555777 62530 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0206 06:49:33.555855 62530 api.go:53] PageSize not implemented I0206 06:49:33.555898 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.555904 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0206 06:49:33.555981 62530 api.go:53] PageSize not implemented I0206 06:49:33.555966 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:33.556031 62530 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0206 06:49:33.556057 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:49:33.556047 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.556073 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0206 06:49:33.556191 62530 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0206 06:49:33.556232 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.556322 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.561488 62530 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0206 06:49:33.561651 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.561828 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.561985 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:33.562137 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.562299 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.562863 62530 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0206 06:49:33.562978 62530 api.go:53] PageSize not implemented I0206 06:49:33.563004 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.563193 62530 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0206 06:49:33.563429 62530 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0206 06:49:33.566619 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:33.566687 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:33.566727 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:33.566766 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:33.566803 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:33.566838 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:33.566876 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:33.566917 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:33.566962 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0206 06:49:33.567000 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0206 06:49:33.567059 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:33.567094 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:33.567129 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:33.567168 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:33.567201 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0206 06:49:33.567236 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:33.567273 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:33.567309 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0206 06:49:33.567346 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0206 06:49:33.567383 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:33.567421 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:33.567455 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0206 06:49:33.567493 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:33.567525 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:33.567558 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:33.567600 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:33.567637 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:33.569086 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:33.569159 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:33.569179 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:33.569221 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569279 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0206 06:49:33.569351 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569417 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569458 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569499 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569540 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569583 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0206 06:49:33.569639 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569692 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:33.569720 62530 natgateway.go:117] DescribeNatGateways: { } I0206 06:49:33.569763 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0206 06:49:33.569800 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0206 06:49:33.569847 62530 api.go:53] PageSize not implemented I0206 06:49:33.569865 62530 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0206 06:49:33.569902 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:33.569926 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:33.569941 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0206 06:49:33.569977 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:33.570001 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:33.570017 62530 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" ] } I0206 06:49:33.570082 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:33.570122 62530 iamrole.go:89] ListRoles: { } I0206 06:49:33.570168 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:33.570197 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:33.570246 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:33.570287 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:33.570323 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0206 06:49:33.570381 62530 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0206 06:49:33.570420 62530 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0206 06:49:33.571017 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.private-shared-ip.example.com ok autoscaling-config:lt-2 ok I0206 06:49:33.571107 62530 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok I0206 06:49:33.571168 62530 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok I0206 06:49:33.571179 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok I0206 06:49:33.571261 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0206 06:49:33.571292 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0206 06:49:33.571337 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } iam-instance-profile:bastions.private-shared-ip.example.com ok I0206 06:49:33.571108 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0206 06:49:33.571424 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:33.571398 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0206 06:49:33.571469 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } autoscaling-group:bastion.private-shared-ip.example.com ok I0206 06:49:33.571463 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0206 06:49:33.571345 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:33.571549 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } route53-record:Z1AFAKE1ZON3YO/A/api.private-shared-ip.example.com ok iam-instance-profile:masters.private-shared-ip.example.com ok iam-instance-profile:nodes.private-shared-ip.example.com ok volume:vol-2 ok I0206 06:49:33.571561 62530 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } load-balancer:api-private-shared-ip-exa-ohatqj ok I0206 06:49:33.571646 62530 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0206 06:49:33.571724 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:33.571819 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0206 06:49:33.571948 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:33.571970 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:33.572006 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0206 06:49:33.572059 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0206 06:49:33.572193 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:33.572223 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } autoscaling-config:lt-1 ok I0206 06:49:33.572274 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } autoscaling-config:lt-3 ok I0206 06:49:33.572302 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok security-group:sg-2 ok volume:vol-1 ok I0206 06:49:33.572409 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0206 06:49:33.572459 62530 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0206 06:49:33.572407 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0206 06:49:33.572477 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0206 06:49:33.572510 62530 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0206 06:49:33.572500 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0206 06:49:33.572555 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0206 06:49:33.572644 62530 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0206 06:49:33.572663 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0206 06:49:33.572700 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0206 06:49:33.572585 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0206 06:49:33.572748 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:33.572735 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0206 06:49:33.572786 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0206 06:49:33.572783 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0206 06:49:33.572804 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0206 06:49:33.572833 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0206 06:49:33.572835 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0206 06:49:33.572951 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:33.573033 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok --- PASS: TestLifecyclePrivateSharedIP (3.03s) === RUN TestLifecycleManyAddons I0206 06:49:33.573641 62530 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:49:33.573816 62530 internetgateways.go:66] CreateInternetGateway: { } I0206 06:49:33.573858 62530 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:49:33.573903 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:49:33.573942 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:49:33.573989 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:49:33.574032 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:49:33.574063 62530 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:49:33.574099 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:49:33.574126 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0206 06:49:33.606661 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:33.610134 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:33.610226 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:34.900464 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:35.711872 62530 iamrole.go:89] ListRoles: { } I0206 06:49:35.713047 62530 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0206 06:49:35.713398 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0206 06:49:35.713453 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.713490 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0206 06:49:35.713621 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:35.713751 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:35.713800 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.713967 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:35.713962 62530 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0206 06:49:35.714029 62530 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.714063 62530 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0206 06:49:35.714163 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:35.714226 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:35.714394 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.714609 62530 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0206 06:49:35.714856 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:35.714941 62530 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.715081 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.715206 62530 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.715300 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0206 06:49:35.715337 62530 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0206 06:49:35.715369 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:35.715416 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:35.717092 62530 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0206 06:49:35.717224 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0206 06:49:35.717367 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:49:35.717408 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:49:35.717363 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0206 06:49:35.717456 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:35.717563 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:35.717558 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:49:35.718674 62530 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:49:35.717600 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.718850 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0206 06:49:35.719070 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:35.719326 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:35.719255 62530 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0206 06:49:35.719543 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:35.719633 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:49:35.719647 62530 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.719838 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0206 06:49:35.720061 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:35.720232 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:35.720297 62530 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:49:35.720397 62530 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0206 06:49:35.720519 62530 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] } I0206 06:49:35.720649 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:35.720664 62530 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" } ] }], VpcId: "vpc-1" } I0206 06:49:35.720999 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:35.721129 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:35.721215 62530 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0206 06:49:35.721357 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:35.721419 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:35.723452 62530 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:49:35.727246 62530 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0206 06:49:35.727421 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:35.727646 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.727839 62530 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:35.727902 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:35.728083 62530 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0206 06:49:35.728313 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.728610 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:49:35.728865 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" }] }] } I0206 06:49:35.729003 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0206 06:49:35.729142 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:49:35.729274 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.729415 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:35.729484 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.729640 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0206 06:49:35.729682 62530 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0206 06:49:35.729723 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.729865 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:35.729972 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:35.730112 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:49:35.730303 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.730506 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:49:35.730771 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" }] }] } I0206 06:49:35.731015 62530 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0206 06:49:35.731232 62530 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0206 06:49:35.731361 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:35.731444 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:35.732102 62530 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0206 06:49:35.732359 62530 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0206 06:49:35.732716 62530 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0206 06:49:35.732774 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:35.732814 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:35.732887 62530 dns.go:235] Pre-creating DNS records I0206 06:49:35.732919 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:35.739076 62530 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0206 06:49:35.742581 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:35.742674 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:37.029159 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:37.845995 62530 iamrole.go:89] ListRoles: { } I0206 06:49:37.846974 62530 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0206 06:49:37.847264 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.847384 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.847447 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:49:37.847467 62530 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:49:37.847496 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:37.847490 62530 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0206 06:49:37.847816 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0206 06:49:37.847947 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.848749 62530 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0206 06:49:37.850201 62530 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0206 06:49:37.850435 62530 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:49:37.850451 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.850568 62530 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:49:37.850579 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0206 06:49:37.850767 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:37.850823 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0206 06:49:37.851017 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:37.851093 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.851222 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:37.851315 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.851447 62530 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:49:37.851491 62530 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:49:37.855946 62530 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0206 06:49:37.856137 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:37.856247 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:37.856343 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:37.856470 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:37.856607 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:37.856932 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:37.857058 62530 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0206 06:49:37.857504 62530 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0206 06:49:37.857744 62530 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0206 06:49:37.857991 62530 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0206 06:49:37.860913 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0206 06:49:37.860976 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0206 06:49:37.861017 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0206 06:49:37.861049 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0206 06:49:37.861083 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0206 06:49:37.861113 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0206 06:49:37.861145 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0206 06:49:37.861180 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0206 06:49:37.861220 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0206 06:49:37.861263 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0206 06:49:37.861299 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0206 06:49:37.861331 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0206 06:49:37.861362 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0206 06:49:37.861397 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0206 06:49:37.861427 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:49:37.861460 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0206 06:49:37.861493 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:49:37.861529 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0206 06:49:37.861563 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0206 06:49:37.861598 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0206 06:49:37.861629 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0206 06:49:37.861665 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0206 06:49:37.861701 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:49:37.861734 62530 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0206 06:49:37.863394 62530 delete_cluster.go:128] Looking for cloud resources to delete W0206 06:49:37.863458 62530 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0206 06:49:37.863477 62530 keypairs.go:95] DescribeKeyPairs: { } I0206 06:49:37.863517 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863565 62530 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0206 06:49:37.863618 62530 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863672 62530 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863743 62530 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863787 62530 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863831 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863869 62530 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0206 06:49:37.863920 62530 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.863967 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0206 06:49:37.864005 62530 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0206 06:49:37.864048 62530 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0206 06:49:37.864087 62530 api.go:53] PageSize not implemented I0206 06:49:37.864108 62530 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0206 06:49:37.864134 62530 loadbalancers.go:35] PageSize not implemented I0206 06:49:37.864153 62530 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0206 06:49:37.864176 62530 targetgroups.go:35] PageSize not implemented I0206 06:49:37.864194 62530 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0206 06:49:37.864257 62530 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0206 06:49:37.864290 62530 iamrole.go:89] ListRoles: { } I0206 06:49:37.864330 62530 zones.go:93] ListHostedZonesPages { } I0206 06:49:37.864358 62530 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0206 06:49:37.864403 62530 internetgateways.go:101] DescribeInternetGateways: { } I0206 06:49:37.864448 62530 routetable.go:53] DescribeRouteTables: { } I0206 06:49:37.864481 62530 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0206 06:49:37.864894 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0206 06:49:37.864970 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0206 06:49:37.864953 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0206 06:49:37.865084 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:nodes.minimal.example.com ok I0206 06:49:37.865049 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0206 06:49:37.865104 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0206 06:49:37.865138 62530 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:49:37.865156 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0206 06:49:37.865184 62530 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0206 06:49:37.865203 62530 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok autoscaling-config:lt-1 ok I0206 06:49:37.865263 62530 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0206 06:49:37.865340 62530 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0206 06:49:37.865170 62530 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.minimal.example.com. ok I0206 06:49:37.865383 62530 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0206 06:49:37.865430 62530 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0206 06:49:37.865477 62530 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0206 06:49:37.865697 62530 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0206 06:49:37.865713 62530 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0206 06:49:37.865787 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0206 06:49:37.865834 62530 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0206 06:49:37.865850 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0206 06:49:37.865883 62530 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0206 06:49:37.865885 62530 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0206 06:49:37.865925 62530 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } subnet:subnet-1 ok I0206 06:49:37.865964 62530 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0206 06:49:37.865979 62530 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0206 06:49:37.866006 62530 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0206 06:49:37.866067 62530 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0206 06:49:37.866134 62530 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0206 06:49:37.866207 62530 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (4.29s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 209.294s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.006s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0206 06:46:10.646271 62949 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.004s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.003s === RUN TestPodController I0206 06:46:10.667212 62952 pod.go:59] starting pod controller I0206 06:46:10.667473 62952 stoppable.go:62] shutting down controller I0206 06:46:10.667521 62952 pod.go:107] Got stop signal --- PASS: TestPodController (0.00s) PASS I0206 06:46:10.667586 62952 pod.go:65] shutting down pod controller ok k8s.io/kops/dns-controller/pkg/watchers 0.027s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.004s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000373d0} route53_test.go:93: Got zone list: [0xc000037400] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc0000960c8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037530} route53_test.go:93: Got zone list: [0xc000037560] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc0000960e0} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc000037660} route53_test.go:170: Successfully added managed DNS zone: &{0xc0003eae40 0xc000096100} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037820} route53_test.go:93: Got zone list: [0xc000037850] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096120} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000379b0} route53_test.go:93: Got zone list: [0xc0000379e0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096148} route53_test.go:187: Successfully added resource record set: {0xc0003e5ef0 0xc000096168} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037cc0} route53_test.go:93: Got zone list: [0xc000037cf0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc0000961f8} route53_test.go:199: Successfully added resource record set: {0xc000402120 0xc000096218} route53_test.go:118: Got 1 recordsets: [0xc000037e90] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000408020} route53_test.go:93: Got zone list: [0xc000408050] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc0000962b8} route53_test.go:221: Successfully added resource record set: {0xc0004022d0 0xc0000962d8} route53_test.go:228: Correctly failed to add duplicate resource record {0xc0004022d0 0xc0000962d8}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000408410} route53_test.go:93: Got zone list: [0xc000408440] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096398} route53_test.go:246: Successfully removed resource set {0xc000402510 0xc0000963b8} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000408720} route53_test.go:93: Got zone list: [0xc000408750] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096448} route53_test.go:264: Successfully removed resource set {0xc0004026c0 0xc000096468} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000408a60} route53_test.go:93: Got zone list: [0xc000408a90] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096500} commontests.go:192: Successfully added resource record set: {0xc000402870 0xc000096520} commontests.go:45: Correctly replaced resource record {0xc000402870 0xc000096520} -> {0xc000402990 0xc000096570} commontests.go:142: Got 1 recordsets: [0xc000408da0] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000408fd0} route53_test.go:93: Got zone list: [0xc000409000] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096628} commontests.go:192: Successfully added resource record set: {0xc000402c60 0xc000096648} commontests.go:70: Correctly replaced resource record {0xc000402c60 0xc000096648} -> {0xc000402d80 0xc000096698} commontests.go:142: Got 1 recordsets: [0xc000409310] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000409590} route53_test.go:93: Got zone list: [0xc0004095c0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096760} commontests.go:192: Successfully added resource record set: {0xc000403050 0xc000096780} commontests.go:142: Got 2 recordsets: [0xc000409830 0xc000409850] commontests.go:142: Got 2 recordsets: [0xc0004098c0 0xc0004098e0] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000409ae0} route53_test.go:93: Got zone list: [0xc000409b10] route53_test.go:98: Got at least 1 zone in list:&{0xc0003eac00 0xc000096888} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.016s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.006s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cece0} clouddns_test.go:71: Got zone list: [0xc000323cf8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000323cc8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cede0} clouddns_test.go:71: Got zone list: [0xc000323db8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000323d88} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000ceee0} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc00012c000 0xc000323e78} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cefa0} clouddns_test.go:71: Got zone list: [0xc000323f38] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000323f08} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf0c0} clouddns_test.go:71: Got zone list: [0xc000010090] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000010060} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf200} clouddns_test.go:71: Got zone list: [0xc0000101f8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc0000101c8} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf360} clouddns_test.go:71: Got zone list: [0xc000010408] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc0000103d8} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf4c0} clouddns_test.go:71: Got zone list: [0xc0000105a0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000010570} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf600} clouddns_test.go:71: Got zone list: [0xc000010708] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc0000106d8} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf760} clouddns_test.go:71: Got zone list: [0xc0000108d0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc0000108a0} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cf8c0} clouddns_test.go:71: Got zone list: [0xc000010ba0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000010b70} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cfa40} clouddns_test.go:71: Got zone list: [0xc000010ed0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000010ea0} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc00032dd30 0xc0000cfc20} clouddns_test.go:71: Got zone list: [0xc0000112a8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc00081bf00 0xc000011278} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.057s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.030s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.006s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.049s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0206 06:46:17.706719 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.706867 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.706908 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.706940 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.706976 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.707023 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.707067 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.707084 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.707118 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.707147 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.714901 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0206 06:46:17.718910 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.718975 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.718996 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.719028 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.719059 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.719104 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.719128 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.719145 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.719163 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.719177 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.720212 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.01s) === RUN TestContainerdBuilder_Simple I0206 06:46:17.725481 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.725576 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.725606 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.725638 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.725663 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.725692 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.725718 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.725747 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.725773 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.725791 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.726904 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.728540 63617 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0206 06:46:17.728559 63617 assetstore.go:111] bin/containerd I0206 06:46:17.728568 63617 assetstore.go:111] bin/containerd-shim I0206 06:46:17.728576 63617 assetstore.go:111] bin/containerd-shim-runc-v1 I0206 06:46:17.728584 63617 assetstore.go:111] bin/containerd-shim-runc-v2 I0206 06:46:17.728591 63617 assetstore.go:111] bin/containerd-stress I0206 06:46:17.728599 63617 assetstore.go:111] bin/ctr I0206 06:46:17.728636 63617 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0206 06:46:17.728650 63617 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0206 06:46:17.731605 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.731670 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.731691 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.731712 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.731734 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.731769 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.731796 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.731815 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.731834 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.731855 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.732740 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.734114 63617 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0206 06:46:17.734944 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.735020 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.735040 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.735061 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.735082 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.735107 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.735176 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.735195 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.735215 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.735229 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.736131 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.737685 63617 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0206 06:46:17.738261 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.738329 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.738350 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.738372 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.738395 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.738424 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.738465 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.738481 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.738502 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.738515 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.739405 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.740941 63617 assetstore.go:108] Matching assets for "^docker/": I0206 06:46:17.740960 63617 assetstore.go:111] docker/containerd I0206 06:46:17.740969 63617 assetstore.go:111] docker/containerd-shim I0206 06:46:17.740976 63617 assetstore.go:111] docker/ctr I0206 06:46:17.740984 63617 assetstore.go:111] docker/docker I0206 06:46:17.740991 63617 assetstore.go:111] docker/docker-init I0206 06:46:17.740999 63617 assetstore.go:111] docker/docker-proxy I0206 06:46:17.741006 63617 assetstore.go:111] docker/dockerd I0206 06:46:17.741013 63617 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.01s) === RUN TestDockerBuilder_LogFlags I0206 06:46:17.745378 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.745487 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.745522 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.745561 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.745602 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.745651 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.745727 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.745763 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.745802 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.745838 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.747464 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.750127 63617 assetstore.go:108] Matching assets for "^docker/": I0206 06:46:17.750153 63617 assetstore.go:111] docker/containerd I0206 06:46:17.750170 63617 assetstore.go:111] docker/containerd-shim I0206 06:46:17.750184 63617 assetstore.go:111] docker/ctr I0206 06:46:17.750197 63617 assetstore.go:111] docker/docker I0206 06:46:17.750210 63617 assetstore.go:111] docker/docker-init I0206 06:46:17.750231 63617 assetstore.go:111] docker/docker-proxy I0206 06:46:17.750244 63617 assetstore.go:111] docker/dockerd I0206 06:46:17.750258 63617 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.01s) === RUN TestDockerBuilder_SkipInstall I0206 06:46:17.753426 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.753499 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.753521 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.753546 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.753571 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.753605 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.753658 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.753690 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.753735 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.753754 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.754763 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.756342 63617 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0206 06:46:17.756461 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.756531 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.756552 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.756585 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.756609 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.756634 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.756674 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.756696 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.756720 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.756738 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.757706 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:17.759321 63617 assetstore.go:108] Matching assets for "^docker/": I0206 06:46:17.759339 63617 assetstore.go:111] docker/docker I0206 06:46:17.759348 63617 assetstore.go:111] docker/docker-containerd I0206 06:46:17.759356 63617 assetstore.go:111] docker/docker-containerd-ctr I0206 06:46:17.759363 63617 assetstore.go:111] docker/docker-containerd-shim I0206 06:46:17.759371 63617 assetstore.go:111] docker/docker-init I0206 06:46:17.759378 63617 assetstore.go:111] docker/docker-proxy I0206 06:46:17.759386 63617 assetstore.go:111] docker/docker-runc I0206 06:46:17.759393 63617 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.01s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0206 06:46:17.766207 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.766370 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.766422 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.766470 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.766521 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.766569 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.766611 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.766646 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.766687 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.766716 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.769752 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.01s) === RUN TestDockerHooksBuilder I0206 06:46:17.771962 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.772026 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.772047 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.772073 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.772096 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.772121 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.772144 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.772161 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.772181 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.772195 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.773926 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0206 06:46:17.776136 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.776203 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.776224 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.776245 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.776269 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.776298 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.776321 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.776341 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.776362 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.776378 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.777939 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.01s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0206 06:46:17.783832 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.783903 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.783924 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.783950 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.783974 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.784001 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.784023 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.784041 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.784061 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.784075 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.785632 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0206 06:46:17.794319 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.794393 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.794416 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.794441 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.794464 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.794491 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.794512 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.794531 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.794553 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.794569 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.797652 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.02s) === RUN TestOIDCConfigAPIServerBuilder I0206 06:46:17.809872 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.809961 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.809988 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.810019 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.810043 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.810073 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.810099 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.810117 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.810138 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.810155 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.812435 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0206 06:46:17.819098 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.819160 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.819180 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.819202 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.819224 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.819249 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.819269 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.819288 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.819308 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.819324 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.820917 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0206 06:46:17.827721 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.827786 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.827808 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.827830 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.827853 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.827876 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.827898 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.827914 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.827934 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.827950 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.829320 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0206 06:46:17.837551 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.837638 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.837661 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.837687 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.837707 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.837734 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.837757 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.837774 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.837795 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.837809 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.839435 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0206 06:46:17.847215 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:17.847278 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:17.847298 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:17.847321 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:17.847343 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:17.847367 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:17.847388 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:17.847405 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:17.847426 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:17.847440 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:17.848937 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.94s) === RUN TestKubeAPIServerBuilderARM64 I0206 06:46:19.786276 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:19.786447 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:19.786518 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:19.786596 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:19.786668 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:19.786745 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:19.786812 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:19.786870 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:19.786945 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:19.786999 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:19.790014 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.15s) === RUN TestKubeControllerManagerBuilder I0206 06:46:20.933360 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:20.933488 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:20.933531 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:20.933581 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:20.933623 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:20.933678 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:20.933732 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:20.933768 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:20.933810 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:20.933840 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:20.936725 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0206 06:46:20.947833 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:20.947959 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:20.948000 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:20.948047 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:20.948087 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:20.948141 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:20.948184 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:20.948218 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:20.948257 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:20.948286 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:20.951222 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.13s) === RUN TestKubeControllerManagerBuilderARM64 I0206 06:46:22.079821 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:22.079947 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:22.079984 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:22.080027 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:22.080065 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:22.080110 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:22.080149 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:22.080177 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:22.080212 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:22.080239 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:22.082898 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.16s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0206 06:46:23.238448 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:23.238539 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:23.238569 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:23.238599 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:23.238621 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:23.238652 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:23.238680 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:23.238697 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:23.238720 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:23.238738 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:23.240532 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0206 06:46:23.244108 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:23.244181 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:23.244204 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:23.244227 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:23.244248 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:23.244275 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:23.244297 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:23.244316 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:23.244336 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:23.244351 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:23.246001 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.13s) === RUN TestKubeProxyBuilderARM64 I0206 06:46:24.372286 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:24.372408 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:24.372446 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:24.372496 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:24.372537 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:24.372585 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:24.372626 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:24.372658 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:24.372698 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:24.372726 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:24.375629 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.12s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0206 06:46:25.495915 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:25.496004 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:25.496030 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:25.496060 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:25.496084 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:25.496112 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:25.496137 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:25.496154 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:25.496177 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:25.496194 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:25.497794 63617 zones.go:93] ListHostedZonesPages { } W0206 06:46:25.500160 63617 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0206 06:46:25.501772 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:25.501834 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:25.501854 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:25.501878 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:25.501901 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:25.501927 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:25.501950 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:25.501969 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:25.501991 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:25.502004 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:25.503531 63617 zones.go:93] ListHostedZonesPages { } W0206 06:46:26.631476 63617 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.13s) === RUN TestKubeSchedulerBuilderARM64 I0206 06:46:26.633342 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:26.633435 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:26.633463 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:26.633495 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:26.633532 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:26.633582 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:26.633621 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:26.633651 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:26.633692 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:26.633740 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:26.636664 63617 zones.go:93] ListHostedZonesPages { } W0206 06:46:27.762943 63617 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.13s) === RUN TestKubectlBuilder I0206 06:46:27.764625 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.764719 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.764751 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.764784 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.764809 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.764841 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.764871 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.764910 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.764939 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.764957 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.766998 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:27.768701 63617 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0206 06:46:27.770525 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.770591 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.770610 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.770633 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.770654 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.770679 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.770699 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.770716 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.770735 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.770749 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.771951 63617 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.00s) === RUN Test_RunKubeletBuilderWarmPool I0206 06:46:27.775335 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.775398 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.775418 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.775439 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.775459 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.775484 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.775506 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.775522 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.775544 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.775558 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.776747 63617 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.00s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0206 06:46:27.779935 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.780002 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.780023 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.780051 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.780073 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.780096 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.780119 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.780137 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.780156 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.780170 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.781729 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:27.783364 63617 assetstore.go:108] Matching assets for "protokube$": I0206 06:46:27.783381 63617 assetstore.go:111] /opt/kops/bin/protokube I0206 06:46:27.783392 63617 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0206 06:46:27.783413 63617 assetstore.go:108] Matching assets for "channels$": I0206 06:46:27.783423 63617 assetstore.go:111] /opt/kops/bin/channels I0206 06:46:27.783430 63617 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.00s) === RUN TestSecretBuilder I0206 06:46:27.784729 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.784790 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.784809 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.784832 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.784854 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.784876 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.784897 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.784913 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.784935 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.784947 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.789121 63617 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.01s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0206 06:46:27.792658 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.792766 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.792800 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.792844 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.792887 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.792932 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.792969 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.793003 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.793041 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.793069 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.795575 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:27.798335 63617 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.01s) === RUN TestUpdateServiceBuilderExternal I0206 06:46:27.798828 63617 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:27.798928 63617 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:27.798962 63617 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:27.798998 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:27.799109 63617 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:27.799156 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:27.799195 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:27.799228 63617 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:27.799266 63617 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:27.799293 63617 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:27.801884 63617 zones.go:93] ListHostedZonesPages { } I0206 06:46:27.804683 63617 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.01s) PASS ok k8s.io/kops/nodeup/pkg/model 10.167s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.032s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.022s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.032s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0206 06:46:17.653411 63621 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0206 06:46:17.653513 63621 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.008s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0206 06:46:18.654772 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.654868 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.654901 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.654922 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.654943 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0206 06:46:18.655133 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655170 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655189 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655209 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655230 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655249 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655273 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655321 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655347 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655369 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655396 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655420 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655441 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655458 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655475 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655502 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655532 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655567 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0206 06:46:18.655595 63809 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0206 06:46:18.655714 63809 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0206 06:46:18.655760 63809 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.090s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.013s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0206 06:46:18.618833 63811 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0206 06:46:18.620080 63811 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0206 06:46:18.621617 63811 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0206 06:46:18.622853 63811 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0206 06:46:18.628541 63811 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.01s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0206 06:46:18.629719 63811 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host W0206 06:46:18.630811 63811 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0206 06:46:18.631778 63811 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0206 06:46:18.631795 63811 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0206 06:46:18.631806 63811 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0206 06:46:18.631819 63811 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.058s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.004s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.071s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.028s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.122s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.112s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.025s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.004s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.003s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.02s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.045s === RUN TestFlagToFalse I0206 06:46:26.206436 65017 featureflag_test.go:32] Created flag Unittest1 I0206 06:46:26.206479 65017 featureflag.go:164] FeatureFlag "UnitTest1"=false I0206 06:46:26.206488 65017 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0206 06:46:26.206552 65017 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.004s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.046s === RUN TestRenderInstanceGroupZones W0206 06:46:26.227007 65019 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.025s === RUN TestWarmPoolOnlyRoll I0206 06:46:38.225267 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.225356 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.225377 65506 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0206 06:46:38.225852 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.225877 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.227141 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.227183 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.232418 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.232477 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.232498 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.232513 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.234626 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.235309 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.235402 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.235432 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.236556 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.236583 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.241794 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.241887 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.242653 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.242713 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.242741 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.243854 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.243879 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.249074 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.249126 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.249146 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.249162 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.250054 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.250731 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.250773 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.251895 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.251922 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.257094 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.257168 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.258002 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.258033 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.259186 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.259213 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.264426 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.264488 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.265266 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.265299 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.266424 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.266449 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.271643 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.271677 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.271690 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.271699 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.272252 65506 instancegroups.go:431] Draining the node: "node-2a.local". I0206 06:46:38.272654 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.272676 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.273799 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.273825 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.279036 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.279104 65506 instancegroups.go:431] Draining the node: "node-2b.local". I0206 06:46:38.279796 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.279825 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.280947 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.280970 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.286182 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.286250 65506 instancegroups.go:431] Draining the node: "node-2c.local". I0206 06:46:38.287083 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.287114 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.288235 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.288259 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.293475 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.293519 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0206 06:46:38.293999 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.294026 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.295161 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.295203 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.295239 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.295253 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.295275 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.296390 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.296427 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.296442 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.296466 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.297564 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.297594 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.297634 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.297649 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.297672 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.298785 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.298822 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.298845 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.298869 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.299984 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.300020 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.300032 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.300054 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.301164 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.301187 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.301223 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.301240 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.301263 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.302368 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.302399 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.302412 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.302438 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.303547 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0206 06:46:38.303579 65506 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0206 06:46:38.303593 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.303623 65506 instancegroups.go:469] waiting for 1ms after terminating instance W0206 06:46:38.304728 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0206 06:46:38.304752 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0206 06:46:38.305031 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.305056 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.306169 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.306228 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.306250 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.306293 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.306314 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.306329 65506 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.306342 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.307002 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.307628 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.307686 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.307712 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.308829 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.308857 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.308873 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.308902 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.309558 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.309601 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.309624 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.310731 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.310756 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.310772 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.310792 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.310810 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.310824 65506 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.310837 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.311663 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.312344 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.312374 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.313494 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.313522 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.313540 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.313569 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.314239 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.314267 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.315997 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.316040 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.316072 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.316114 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.316909 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.316939 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.318055 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.318084 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.318102 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.318118 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.318134 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.318148 65506 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.318160 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.318941 65506 instancegroups.go:431] Draining the node: "node-2a.local". I0206 06:46:38.319553 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.319579 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.320691 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.320716 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.320735 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.320762 65506 instancegroups.go:431] Draining the node: "node-2b.local". I0206 06:46:38.321383 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.321409 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.322525 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.322552 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.322570 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.322599 65506 instancegroups.go:431] Draining the node: "node-2c.local". I0206 06:46:38.323266 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.323294 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.324404 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.324440 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0206 06:46:38.324457 65506 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0206 06:46:38.324476 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0206 06:46:38.324771 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0206 06:46:38.324984 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.325007 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.326129 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.326150 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.331342 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.331411 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.331431 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.331444 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.332139 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.332691 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.332750 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.332778 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.333912 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.333950 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.339147 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.339202 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.340015 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.340112 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.340169 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.341321 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.341346 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.346540 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.346590 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.346615 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.346629 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.347529 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.348145 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.348182 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.349321 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.349351 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.355136 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.355205 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.356061 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.356092 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.357204 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.357224 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.362440 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.362510 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.365501 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.365554 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.366688 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.366721 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.371943 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.371986 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.372009 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.372026 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.373174 65506 instancegroups.go:431] Draining the node: "node-2a.local". I0206 06:46:38.373996 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.374042 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.375161 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.375183 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.380392 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.380447 65506 instancegroups.go:431] Draining the node: "node-2b.local". I0206 06:46:38.381391 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.381430 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.382524 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.382565 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.387766 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.387812 65506 instancegroups.go:431] Draining the node: "node-2c.local". I0206 06:46:38.388673 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.388711 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.389855 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.389892 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.395102 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.395135 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.07s) === RUN TestRollingUpdateEmptyGroup I0206 06:46:38.395343 65506 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0206 06:46:38.395835 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.395863 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.401422 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.401472 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.401498 65506 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.01s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0206 06:46:38.401942 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.401979 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.403121 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.403146 65506 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0206 06:46:38.403165 65506 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0206 06:46:38.403377 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.403399 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.403413 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.403427 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0206 06:46:38.403605 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.403624 65506 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0206 06:46:38.403637 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.403650 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0206 06:46:38.403856 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.403881 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.405032 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.405072 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.410259 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.410327 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.410349 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.410358 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.410954 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.411400 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.411455 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.411480 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.412608 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.412641 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.412661 65506 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0206 06:46:38.413015 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.413043 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.414180 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.414211 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.419424 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.419485 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.419500 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.419510 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.420054 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.420780 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.420849 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.420879 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.422028 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.422053 65506 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0206 06:46:38.422080 65506 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0206 06:46:38.422306 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.422328 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.422337 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.423010 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.423454 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.423476 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.424614 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.424635 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.429849 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.429924 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.430821 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.430855 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.431991 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.432020 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.437249 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.437301 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.438032 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.438059 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.439236 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.439268 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.444509 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.444544 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0206 06:46:38.444793 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.444811 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.444825 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.444834 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0206 06:46:38.444970 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.444985 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.444993 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.445001 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0206 06:46:38.445136 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.445150 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.445159 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.445167 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0206 06:46:38.445337 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.445353 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.445362 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.446019 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.446482 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.446505 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.447623 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.447654 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.453360 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.453421 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.454149 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.454176 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.455277 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.455297 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.460471 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.460571 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.461264 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.461289 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.462469 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.462494 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.467683 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.467717 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.467737 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.467756 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.467769 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0206 06:46:38.468040 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.468069 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.468078 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.468816 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.469362 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.469394 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.470523 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.470566 65506 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0206 06:46:38.470577 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.470585 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0206 06:46:38.470681 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.470692 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.470698 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.471140 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.471680 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.471703 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.472815 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.472842 65506 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0206 06:46:38.472857 65506 instancegroups.go:509] Cluster did not validate within 0s E0206 06:46:38.472875 65506 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0206 06:46:38.473101 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.473125 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.474223 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.474249 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.475382 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.480596 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.481738 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.486923 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.488057 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.493242 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.493307 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.493321 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.493329 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.493819 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.494185 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.494237 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.494252 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.495401 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.495419 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.500613 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.500660 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.501115 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.501166 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.501182 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.502316 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.502346 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.507561 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.507588 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.507601 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.507608 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.508106 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.508497 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.508528 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.509659 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.509691 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.514913 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.514966 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.515779 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.515798 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.516924 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.516947 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.522126 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.522156 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.522545 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.522561 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.523682 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.523727 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.530084 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.530131 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.530162 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.530179 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.531257 65506 instancegroups.go:431] Draining the node: "node-2a.local". I0206 06:46:38.531974 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.532008 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.533158 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.533213 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.538441 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.538515 65506 instancegroups.go:431] Draining the node: "node-2b.local". I0206 06:46:38.539406 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.539440 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.540576 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.540652 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.545867 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.545937 65506 instancegroups.go:431] Draining the node: "node-2c.local". I0206 06:46:38.546800 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.546832 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.547967 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.548017 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.553227 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.553265 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0206 06:46:38.553605 65506 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0206 06:46:38.553634 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.554772 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.554810 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.555932 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.557067 65506 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0206 06:46:38.558190 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.563387 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.563503 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.563543 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.563565 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.564478 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.565258 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.565351 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.565387 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.566512 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.566541 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.571753 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.571803 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.572401 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.572454 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.572476 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.573592 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.573615 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.578800 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.578832 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.578847 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.578857 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.579449 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.579907 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.579934 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.581046 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.581072 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.586256 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.586301 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.586887 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.586915 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.588032 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.588066 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.593289 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.593327 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.593935 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.593960 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.595100 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.595119 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.600223 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.600248 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.600268 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.600284 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.601257 65506 instancegroups.go:431] Draining the node: "node-2a.local". I0206 06:46:38.602023 65506 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0206 06:46:38.602053 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.603199 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.603221 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.608383 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.608417 65506 instancegroups.go:431] Draining the node: "node-2b.local". I0206 06:46:38.608929 65506 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0206 06:46:38.608952 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.610070 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.610095 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.615276 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.615309 65506 instancegroups.go:431] Draining the node: "node-2c.local". I0206 06:46:38.615895 65506 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0206 06:46:38.615927 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.617070 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.617097 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.622284 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.622319 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0206 06:46:38.622787 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.622804 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.622812 65506 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0206 06:46:38.623301 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.623784 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.623807 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.624925 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.624946 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.630149 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.630222 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.630934 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.630971 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.632093 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.632124 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.637333 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.637385 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0206 06:46:38.637686 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.637720 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.637735 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.638251 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:38.638734 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:38.638806 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:38.638843 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.639942 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.639960 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.645172 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.645229 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:38.646063 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:38.646138 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:38.646168 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.647275 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.647296 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.654027 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.654077 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.02s) === RUN TestRollingUpdateDisabled I0206 06:46:38.654374 65506 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0206 06:46:38.654400 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0206 06:46:38.654410 65506 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0206 06:46:38.654418 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0206 06:46:38.654428 65506 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0206 06:46:38.654434 65506 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0206 06:46:38.654442 65506 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0206 06:46:38.654451 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0206 06:46:38.654603 65506 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0206 06:46:38.654653 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:38.655806 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.655826 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.661014 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.661050 65506 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0206 06:46:38.661095 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.661108 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.661116 65506 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0206 06:46:38.661546 65506 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0206 06:46:38.661562 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.661571 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.661577 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:38.662010 65506 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0206 06:46:38.662045 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:38.663178 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.663194 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.668411 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.668449 65506 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0206 06:46:38.668463 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.668476 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.668484 65506 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0206 06:46:38.669064 65506 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0206 06:46:38.669100 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:38.670213 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.670231 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:38.675426 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.675465 65506 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0206 06:46:38.675481 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0206 06:46:38.675723 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.675741 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.675748 65506 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0206 06:46:38.676991 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.677451 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.677477 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.678606 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.678638 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.678676 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.678728 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.679509 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.679679 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.679702 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.680818 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.680861 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.781269 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.781353 65506 instancegroups.go:431] Draining the node: "node-1e.local". I0206 06:46:38.781498 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:38.782807 65506 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0206 06:46:38.783029 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:38.783065 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.784223 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.784266 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.784294 65506 instancegroups.go:431] Draining the node: "node-1f.local". I0206 06:46:38.784851 65506 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0206 06:46:38.784888 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.786048 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.786102 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.886568 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.886627 65506 instancegroups.go:431] Draining the node: "node-1g.local". I0206 06:46:38.887252 65506 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0206 06:46:38.887281 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.888457 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.888501 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.888516 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0206 06:46:38.888764 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.888793 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.888802 65506 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0206 06:46:38.890101 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:38.890154 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:38.891034 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:38.891449 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:38.891484 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.892648 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.892714 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.993106 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.993166 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:38.993220 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:38.994218 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:38.994407 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:38.994437 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.995573 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.995611 65506 instancegroups.go:540] Cluster validated. I0206 06:46:38.995648 65506 instancegroups.go:431] Draining the node: "node-1e.local". I0206 06:46:38.996514 65506 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0206 06:46:38.996555 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:38.997704 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:38.997747 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.098164 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.098222 65506 instancegroups.go:431] Draining the node: "node-1f.local". I0206 06:46:39.099002 65506 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0206 06:46:39.099039 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.100332 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.100767 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.100837 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0206 06:46:39.101306 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.101348 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.101368 65506 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0206 06:46:39.103495 65506 instancegroups.go:431] Draining the node: "master-1a.local". I0206 06:46:39.103966 65506 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0206 06:46:39.104023 65506 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0206 06:46:39.104050 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.105208 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.105235 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.105258 65506 instancegroups.go:431] Draining the node: "master-1c.local". I0206 06:46:39.105327 65506 instancegroups.go:431] Draining the node: "master-1b.local". I0206 06:46:39.105851 65506 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0206 06:46:39.105897 65506 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0206 06:46:39.106160 65506 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0206 06:46:39.106221 65506 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0206 06:46:39.106256 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.107401 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.107451 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.207826 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.207909 65506 instancegroups.go:431] Draining the node: "master-1e.local". I0206 06:46:39.207945 65506 instancegroups.go:431] Draining the node: "master-1d.local". I0206 06:46:39.208505 65506 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0206 06:46:39.208562 65506 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0206 06:46:39.208998 65506 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0206 06:46:39.209054 65506 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0206 06:46:39.209082 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.210215 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.210251 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.210294 65506 instancegroups.go:431] Draining the node: "master-1f.local". I0206 06:46:39.210908 65506 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0206 06:46:39.210949 65506 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0206 06:46:39.210974 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.212122 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.212187 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.312624 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.312699 65506 instancegroups.go:431] Draining the node: "master-1g.local". I0206 06:46:39.313419 65506 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0206 06:46:39.313473 65506 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0206 06:46:39.313508 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.314673 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.314732 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.314755 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0206 06:46:39.315056 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.315096 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.315110 65506 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0206 06:46:39.316749 65506 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0206 06:46:39.316809 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.317943 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.317985 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.317996 65506 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0206 06:46:39.318049 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.319169 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.319200 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.319240 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.319958 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.320010 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.320569 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.320602 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.327070 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.327163 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.427546 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.427622 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:39.427693 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:39.428179 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:39.428487 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:39.428511 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.429635 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.429659 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.429675 65506 instancegroups.go:431] Draining the node: "node-1e.local". I0206 06:46:39.430055 65506 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0206 06:46:39.430081 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.431185 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.431215 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.535974 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.536065 65506 instancegroups.go:431] Draining the node: "node-1f.local". I0206 06:46:39.536789 65506 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0206 06:46:39.536826 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.537972 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.538021 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.538035 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.22s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0206 06:46:39.538258 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.538287 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.538295 65506 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0206 06:46:39.539189 65506 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0206 06:46:39.539218 65506 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0206 06:46:39.539240 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.540383 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.540425 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.540451 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.540517 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.540944 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.541209 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.541229 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.542334 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.542365 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.642764 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.642842 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:39.642844 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:39.643670 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:39.643845 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:39.643880 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.645000 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.645029 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.645053 65506 instancegroups.go:431] Draining the node: "node-1e.local". I0206 06:46:39.645419 65506 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0206 06:46:39.645450 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.646595 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.646624 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.747228 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.747281 65506 instancegroups.go:431] Draining the node: "node-1f.local". I0206 06:46:39.747785 65506 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0206 06:46:39.747830 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.748966 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.748996 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.749016 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0206 06:46:39.749174 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.749190 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.749199 65506 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0206 06:46:39.749513 65506 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0206 06:46:39.749534 65506 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0206 06:46:39.749561 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.750684 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.750701 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:39.755809 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.755874 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.755915 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.756570 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.756594 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.756740 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.756759 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.757733 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.757750 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:39.763019 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.763058 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0206 06:46:39.763238 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.763251 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.763257 65506 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0206 06:46:39.763626 65506 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0206 06:46:39.763656 65506 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0206 06:46:39.763664 65506 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0206 06:46:39.763682 65506 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0206 06:46:39.763697 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.764820 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.764835 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:39.770003 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.770057 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.770092 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.770924 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.770955 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.771138 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.771168 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.772077 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.772092 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:39.777336 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.777373 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.01s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0206 06:46:39.777595 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.777615 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.777623 65506 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0206 06:46:39.778265 65506 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0206 06:46:39.778297 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.779402 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.779428 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.779439 65506 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0206 06:46:39.779477 65506 instancegroups.go:203] waiting for 1ms after detaching instance I0206 06:46:39.780602 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.780623 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.780659 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:39.780690 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.780710 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.781649 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:39.781689 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.781868 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.781901 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.782070 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.782108 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.782806 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.883283 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.883363 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:39.884072 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:39.884118 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.885251 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.885273 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.885283 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0206 06:46:39.885419 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.885433 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.885439 65506 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0206 06:46:39.886353 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:39.886667 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:39.886687 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.887792 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.887813 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.887839 65506 instancegroups.go:431] Draining the node: "node-1e.local". I0206 06:46:39.887887 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:39.888535 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:39.888648 65506 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0206 06:46:39.888667 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.889796 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.889835 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.990300 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.990384 65506 instancegroups.go:431] Draining the node: "node-1g.local". I0206 06:46:39.990431 65506 instancegroups.go:431] Draining the node: "node-1f.local". I0206 06:46:39.990924 65506 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0206 06:46:39.991203 65506 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0206 06:46:39.991225 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.992341 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.992369 65506 instancegroups.go:540] Cluster validated. I0206 06:46:39.992392 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:39.992927 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:39.992954 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:39.994082 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:39.994117 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:40.094591 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.094658 65506 instancegroups.go:431] Draining the node: "node-1d.local". I0206 06:46:40.095223 65506 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0206 06:46:40.095252 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:40.096400 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.096422 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.096433 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.21s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0206 06:46:40.096597 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.096609 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.096616 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0206 06:46:40.096625 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0206 06:46:40.096632 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0206 06:46:40.096641 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0206 06:46:40.096724 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.096735 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.096741 65506 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0206 06:46:40.097210 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0206 06:46:40.097223 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0206 06:46:40.097230 65506 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0206 06:46:40.097251 65506 instancegroups.go:431] Draining the node: "node-1a.local". I0206 06:46:40.097601 65506 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0206 06:46:40.097615 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:40.098755 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.098770 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:40.103946 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.103981 65506 instancegroups.go:431] Draining the node: "node-1b.local". I0206 06:46:40.104418 65506 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0206 06:46:40.104435 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:40.105568 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.105597 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:40.110914 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.110951 65506 instancegroups.go:431] Draining the node: "node-1c.local". I0206 06:46:40.111365 65506 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0206 06:46:40.111382 65506 instancegroups.go:469] waiting for 1ms after terminating instance I0206 06:46:40.112521 65506 instancegroups.go:504] Validating the cluster. I0206 06:46:40.112537 65506 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0206 06:46:40.117719 65506 instancegroups.go:540] Cluster validated. I0206 06:46:40.117739 65506 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.977s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.004s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.014s === RUN TestParse E0206 06:46:38.154610 65509 versions.go:96] unable to parse Kubernetes version "" E0206 06:46:38.154748 65509 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.010s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.037s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.12s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.179s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.091s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.090s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.075s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0206 06:46:38.200025 65515 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.059s === RUN Test_RunEtcdManagerBuilder I0206 06:46:38.208799 65516 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0206 06:46:38.250810 65516 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0206 06:46:38.253515 65516 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.05s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.02s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.01s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.116s === RUN Test_RunKubeApiserverBuilder I0206 06:46:38.217358 65517 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.086s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.093s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.034s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.063s === RUN TestServerGroupBuilder I0206 06:46:46.395961 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.409561 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.420651 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.444160 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.551631 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.569236 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.588524 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.603920 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.622857 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.688508 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.697402 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.708950 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.715412 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.721300 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.728968 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.738752 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.745176 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.751856 1190 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.45s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.530s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.038s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.040s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.030s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.01s) --- PASS: TestGenerateCertificate/selfsigned (0.01s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (1.08s) --- PASS: TestIssueCert/ca (0.42s) --- PASS: TestIssueCert/client (0.28s) --- PASS: TestIssueCert/clientOneYear (0.38s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 1.099s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.004s === RUN TestAddUntaggedRouteTables I0206 06:46:46.428652 1196 routetable.go:53] DescribeRouteTables: { } I0206 06:46:46.428869 1196 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") W0206 06:46:46.428904 1196 tags.go:67] cluster tag not found on route-table:rtb-1234 --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0206 06:46:46.429133 1196 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0206 06:46:46.429289 1196 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0206 06:46:46.429460 1196 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0206 06:46:46.429658 1196 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0206 06:46:46.429839 1196 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0206 06:46:46.430008 1196 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0206 06:46:46.430201 1196 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0206 06:46:46.430269 1196 volumes.go:128] DescribeVolumes: { } W0206 06:46:46.430333 1196 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0206 06:46:46.430604 1196 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:46.430742 1196 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:46.430800 1196 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:46.430933 1196 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:46.431005 1196 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:46.431087 1196 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:46.431149 1196 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:46.431186 1196 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:46.431251 1196 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:46.431298 1196 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:46.431332 1196 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0206 06:46:46.431386 1196 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0206 06:46:46.431421 1196 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0206 06:46:46.431479 1196 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0206 06:46:46.431515 1196 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0206 06:46:46.431572 1196 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0206 06:46:46.431643 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0206 06:46:46.431695 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0206 06:46:46.431745 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0206 06:46:46.431788 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0206 06:46:46.431848 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0206 06:46:46.431902 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0206 06:46:46.431954 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0206 06:46:46.432007 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0206 06:46:46.432065 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0206 06:46:46.432111 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0206 06:46:46.432166 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0206 06:46:46.432203 1196 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.114s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.038s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.085s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.005s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.004s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.004s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.004s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.003s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.01s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.051s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.02s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.105s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.004s === RUN TestRemovesDuplicateGuardedBlocks W0206 06:46:53.705691 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705772 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705782 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705792 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705801 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705809 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705818 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705828 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705837 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705847 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705856 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705865 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705874 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705883 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.705892 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.705901 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722314 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722346 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722430 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722446 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722515 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722529 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722601 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722616 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722684 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722698 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722784 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722800 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722875 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722890 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.722977 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.722992 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723066 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723081 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723164 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723184 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723264 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723278 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723343 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723357 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723432 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723446 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723523 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723538 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723606 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723620 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723717 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723733 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723807 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723821 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723883 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723896 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.723968 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.723983 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724117 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724132 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724203 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724217 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724291 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724306 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724367 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724381 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724450 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724465 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724531 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724565 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724636 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724656 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724726 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724750 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724819 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724834 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724908 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.724924 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.724996 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725010 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725078 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725091 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725171 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725186 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725254 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725269 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725333 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725346 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725425 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725439 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725524 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725540 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725640 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725656 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725728 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725745 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725830 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725845 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.725927 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.725942 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726013 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726027 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726121 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726136 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726225 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726239 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726311 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726326 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726399 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726414 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726488 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726505 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726575 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726616 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726710 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726726 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726798 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726813 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726885 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726900 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.726977 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.726992 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727084 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727102 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727193 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727211 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727290 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727307 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727384 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727399 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727475 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727490 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727560 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727575 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727657 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727672 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727744 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727759 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727833 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727847 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.727926 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.727941 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728018 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728033 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728100 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728115 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728251 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728265 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728330 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728345 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728428 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728442 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728529 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728545 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728621 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728638 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728720 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728736 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728802 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728816 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728884 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728899 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.728970 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.728984 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729054 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729067 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729153 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729169 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729246 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729260 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729335 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729351 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729432 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729446 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729519 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729535 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729617 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729632 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729743 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729798 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.729913 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.729930 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730010 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730025 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730097 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730117 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730199 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730215 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730329 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730344 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730425 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730439 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730518 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730534 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730613 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730629 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730702 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730722 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730835 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730850 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.730927 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.730941 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731020 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731036 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731121 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731137 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731223 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731239 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731325 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731341 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731434 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731451 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731530 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731547 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731627 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731647 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.731722 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.731738 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.03s) === RUN TestRecoversFromBadNesting W0206 06:46:53.732243 2444 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0206 06:46:53.732256 2444 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0206 06:46:53.732268 2444 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0206 06:46:53.732279 2444 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0206 06:46:53.732291 2444 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0206 06:46:53.732303 2444 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0206 06:46:53.732312 2444 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0206 06:46:53.732346 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732361 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732373 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.732383 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732395 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.732406 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732418 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.732429 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732442 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.732458 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732471 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732482 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732494 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732506 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.732519 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.732530 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.739907 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.739944 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740038 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740071 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740154 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740170 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740254 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740270 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740340 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740356 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740446 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740472 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740588 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740603 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740682 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740697 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740778 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740797 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740876 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740890 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.740974 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.740989 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741081 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741097 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741192 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741208 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741297 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741313 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741392 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741426 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741509 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741525 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741615 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741630 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741704 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741719 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741800 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741816 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.741906 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.741922 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742021 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742036 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742111 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742131 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742204 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742219 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742294 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742310 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742394 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742410 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742502 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742518 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742589 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742604 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742696 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742713 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742788 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742804 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742880 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.742896 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.742992 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743009 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743092 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743107 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743186 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743202 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743281 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743296 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743341 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743350 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743396 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743405 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743467 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743481 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743550 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743571 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743641 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743653 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743727 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743741 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743812 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743825 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743911 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743925 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.743986 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.743999 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744068 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744083 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744152 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744162 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744203 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744212 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744297 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744307 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744353 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744362 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744407 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744419 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744459 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744468 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744511 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744522 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744570 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744579 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744620 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744628 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744676 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744687 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744752 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744761 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744809 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744818 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744864 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744873 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744921 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744930 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.744969 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.744977 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745038 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745047 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745087 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745096 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745135 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745143 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745190 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745198 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745251 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745259 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745317 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745326 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745368 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745383 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745423 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745431 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745479 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745488 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745527 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745535 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745575 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745588 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745634 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745643 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745685 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745693 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745733 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745741 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745786 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745794 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745834 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745842 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745895 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745903 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.745951 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.745960 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746002 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746011 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746064 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746077 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746121 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746130 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746174 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746183 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746223 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746231 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746277 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746287 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746339 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746348 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746396 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746405 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746443 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746454 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746494 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746502 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746546 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746558 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746599 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746607 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746657 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746665 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746705 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746713 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746769 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746778 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746818 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746826 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746870 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746878 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746917 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746925 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.746972 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.746980 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.747025 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.747042 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.747090 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.747098 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0206 06:46:53.747137 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0206 06:46:53.747145 2444 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.02s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.045s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.00s) PASS ok k8s.io/kops/tests/codecs 0.033s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.03s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.02s) --- PASS: TestChannelImages/stable-channel (0.01s) --- PASS: TestChannelImages/alpha-channel (0.01s) PASS ok k8s.io/kops/tests/integration/channel 0.091s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.02s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.02s) PASS ok k8s.io/kops/tests/integration/conversion 0.055s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0206 06:46:53.737282 2451 files.go:57] Writing file "/tmp/TestWriteFile1277317505/001/SubDir/test1.tmp" I0206 06:46:53.737406 2451 files.go:113] Changing file mode for "/tmp/TestWriteFile1277317505/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.01s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.048s === RUN TestBootstrapChannelBuilder_BuildTasks I0206 06:46:56.940146 3348 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:56.940362 3348 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:56.940431 3348 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:56.940480 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:56.940534 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:56.940611 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:56.940662 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:56.940695 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:56.940746 3348 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:56.940783 3348 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:56.953579 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.071958 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.219641 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.318502 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.435147 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.586789 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.764904 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:57.920529 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:58.421866 3348 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.59s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0206 06:46:58.534794 3348 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:58.534877 3348 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:58.534937 3348 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:58.534972 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:58.534999 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:58.535033 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:58.535063 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:58.535082 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:58.535105 3348 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:58.535125 3348 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:58.535144 3348 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0206 06:46:58.536324 3348 zones.go:93] ListHostedZonesPages { } I0206 06:46:58.686279 3348 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.15s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0206 06:46:58.686415 3348 featureflag.go:164] FeatureFlag "ImageDigest"=false I0206 06:46:58.686489 3348 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:58.686534 3348 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0206 06:46:58.686573 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0206 06:46:58.686599 3348 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0206 06:46:58.686632 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0206 06:46:58.686661 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0206 06:46:58.686678 3348 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0206 06:46:58.686702 3348 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0206 06:46:58.686721 3348 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0206 06:46:58.687952 3348 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.13s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.22s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0206 06:46:59.061322 3348 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0206 06:46:59.096129 3348 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0206 06:46:59.096194 3348 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0206 06:46:59.096209 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0206 06:46:59.096263 3348 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0206 06:46:59.096277 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0206 06:46:59.096334 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0206 06:46:59.096389 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0206 06:46:59.096446 3348 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0206 06:46:59.096460 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0206 06:46:59.096513 3348 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0206 06:46:59.096528 3348 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0206 06:46:59.096608 3348 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0206 06:46:59.096691 3348 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0206 06:46:59.096762 3348 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0206 06:46:59.096776 3348 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0206 06:46:59.096788 3348 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0206 06:46:59.096801 3348 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0206 06:46:59.096816 3348 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0206 06:46:59.096828 3348 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0206 06:46:59.096840 3348 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0206 06:46:59.096852 3348 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0206 06:46:59.097958 3348 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0206 06:46:59.098140 3348 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 2.255s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0206 06:46:56.918191 3349 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender77412107/001 I0206 06:46:56.918438 3349 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender77412107/001 I0206 06:46:56.918631 3349 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender77412107/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0206 06:46:56.922116 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0206 06:46:56.922249 3349 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0206 06:46:56.922351 3349 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0206 06:46:56.922529 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.922714 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.922828 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.922885 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.923174 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.923243 3349 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0206 06:46:56.923316 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.923415 3349 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0206 06:46:56.923540 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0206 06:46:56.923634 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.923722 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.923801 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.923849 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.923907 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.923989 3349 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0206 06:46:56.924087 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0206 06:46:56.924291 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.924376 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.924512 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.924593 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.924643 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.924710 3349 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0206 06:46:56.924825 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.925061 3349 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0206 06:46:56.925144 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.925194 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.925250 3349 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0206 06:46:56.925344 3349 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.925576 3349 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0206 06:46:56.925658 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.925706 3349 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" },{ Key: "AssociatedElasticIp", Value: "192.0.2.1" }] } I0206 06:46:56.925772 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0206 06:46:56.925889 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.925960 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.926046 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.926088 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.926138 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.926186 3349 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0206 06:46:56.926260 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.926355 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.926407 3349 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0206 06:46:56.926484 3349 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.926569 3349 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0206 06:46:56.926635 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0206 06:46:56.926702 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0206 06:46:56.926842 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0206 06:46:56.926921 3349 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0206 06:46:56.926968 3349 internetgateways.go:66] CreateInternetGateway: { } I0206 06:46:56.927005 3349 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0206 06:46:56.927098 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.927172 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.927270 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.927312 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.927424 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.927475 3349 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0206 06:46:56.927533 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.927634 3349 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0206 06:46:56.927734 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0206 06:46:56.927820 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.927884 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.927955 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.928000 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.928057 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.928126 3349 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0206 06:46:56.928215 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0206 06:46:56.928802 3349 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender3970554151/001 I0206 06:46:56.929128 3349 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender3970554151/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0206 06:46:56.929517 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.929559 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.929630 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.929661 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.929683 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.929701 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.929768 3349 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0206 06:46:56.929939 3349 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0206 06:46:56.929972 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0206 06:46:56.929996 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0206 06:46:56.930035 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.930065 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.930106 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.930119 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.930139 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.930156 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.930184 3349 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0206 06:46:56.930254 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0206 06:46:56.930438 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.930468 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.930560 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.930588 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.930604 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.930620 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.930662 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.930747 3349 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0206 06:46:56.930783 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.930800 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.930830 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0206 06:46:56.930901 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.930931 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.930975 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.930987 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.931005 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.931034 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.931059 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.931110 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.931127 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0206 06:46:56.931216 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.931249 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.931333 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.931359 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.931376 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.931392 3349 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0206 06:46:56.931434 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.931499 3349 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0206 06:46:56.931511 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.931696 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.931742 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.931760 3349 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:46:56.931810 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0206 06:46:56.931879 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.931928 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.931967 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.931980 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.932000 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.932018 3349 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0206 06:46:56.932049 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.932108 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.932136 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.932168 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0206 06:46:56.932245 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.932277 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.932338 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.932365 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.932381 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.932398 3349 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0206 06:46:56.932426 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.932563 3349 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0206 06:46:56.932575 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.932754 3349 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0206 06:46:56.932816 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.932850 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.932888 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0206 06:46:56.932990 3349 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0206 06:46:56.933045 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.933088 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.933105 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.933132 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.933155 3349 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0206 06:46:56.933193 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.933241 3349 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0206 06:46:56.933355 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.933383 3349 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0206 06:46:56.933465 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0206 06:46:56.933525 3349 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0206 06:46:56.933589 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.933627 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.933661 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.933676 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.933764 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.933793 3349 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0206 06:46:56.933824 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.933865 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.934008 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0206 06:46:56.934036 3349 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0206 06:46:56.934065 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0206 06:46:56.934142 3349 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0206 06:46:56.934179 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.934214 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.934229 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.934268 3349 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0206 06:46:56.934299 3349 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0206 06:46:56.934353 3349 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0206 06:46:56.934432 3349 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:56.934488 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.934609 3349 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0206 06:46:56.934661 3349 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0206 06:46:56.934694 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.934729 3349 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:56.934779 3349 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:56.934834 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0206 06:46:56.934884 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.934910 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.934946 3349 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0206 06:46:56.934976 3349 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0206 06:46:56.935119 3349 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0206 06:46:56.935204 3349 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:56.935261 3349 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0206 06:46:56.935328 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0206 06:46:56.935346 3349 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0206 06:46:56.935378 3349 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.072s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.091s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.049s === RUN TestDiskRenderAzure I0206 06:46:59.852263 3555 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0206 06:46:59.852818 3555 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0206 06:46:59.853208 3555 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0206 06:46:59.854190 3555 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0206 06:46:59.854574 3555 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0206 06:46:59.858740 3555 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0206 06:46:59.859724 3555 resourcegroup.go:108] Creating a new Resource Group with name: rg I0206 06:46:59.859790 3555 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0206 06:46:59.860384 3555 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0206 06:46:59.862211 3555 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0206 06:46:59.862623 3555 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0206 06:46:59.863042 3555 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0206 06:46:59.863577 3555 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0206 06:46:59.864079 3555 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.068s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.068s === RUN TestProjectIAMBinding I0206 06:46:59.882482 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.883934 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.883988 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.884692 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.884741 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.885008 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0206 06:46:59.885211 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.885373 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.885408 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.885586 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.885611 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.885671 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0206 06:46:59.885790 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.886051 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.886074 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.886455 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0206 06:46:59.886483 3558 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0206 06:46:59.886622 3558 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.089s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.02s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.01s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.114s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.108s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.046s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.071s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.005s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.074s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0206 06:47:01.730701 4463 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0206 06:47:01.730793 4463 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0206 06:47:01.730805 4463 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0206 06:47:01.730819 4463 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0206 06:47:01.730830 4463 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0206 06:47:01.730841 4463 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0206 06:47:01.730853 4463 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0206 06:47:01.731401 4463 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.066s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.004s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.004s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.003s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.004s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.004s === RUN TestGetProxyEnvVars W0206 06:47:01.696422 4469 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.029s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.030s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.003s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.003s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.023s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0206 06:47:06.189748 4570 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.066s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... >>> kops*: Package size: 145.5 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r0.apk >>> kops: Build complete at Tue, 06 Feb 2024 06:49:43 +0000 elapsed time 0h 6m 22s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/5) Purging .makedepends-kops (20240206.064323) (2/5) Purging kubernetes (1.29.1-r0) (3/5) Purging go (1.21.6-r0) (4/5) Purging bash (5.2.26-r0) Executing bash-5.2.26-r0.pre-deinstall (5/5) Purging readline (8.2.10-r0) Executing busybox-1.36.1-r19.trigger OK: 378 MiB in 106 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...