>>> kops: Building testing/kops 1.28.4-r16 (using abuild 3.16.0-r0) started Sat, 17 Jan 2026 00:16:39 +0000 >>> kops: Validating /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/4) Installing kubernetes (1.34.3-r1) (2/4) Installing go (1.25.6-r0) (3/4) Installing bash (5.3.3-r1) Executing bash-5.3.3-r1.post-install (4/4) Installing .makedepends-kops (20260117.001640) Executing busybox-1.37.0-r31.trigger OK: 595.5 MiB in 111 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz Connecting to distfiles.alpinelinux.org (172.105.82.32:443) saving to '/var/cache/distfiles/edge/kops-1.28.4.tar.gz.part' kops-1.28.4.tar.gz.p 100% |********************************| 32.7M 0:00:00 ETA '/var/cache/distfiles/edge/kops-1.28.4.tar.gz.part' saved /var/cache/distfiles/edge/kops-1.28.4.tar.gz: OK >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz /var/cache/distfiles/edge/kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading k8s.io/apimachinery v0.28.1 go: downloading golang.org/x/crypto v0.14.0 go: downloading k8s.io/kubectl v0.28.1 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading github.com/spf13/cobra v1.7.0 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/spf13/pflag v1.0.5 go: downloading k8s.io/api v0.28.1 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading github.com/spf13/viper v1.16.0 go: downloading k8s.io/client-go v0.28.1 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading go.uber.org/multierr v1.11.0 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading k8s.io/klog v1.0.0 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading google.golang.org/api v0.138.0 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading k8s.io/mount-utils v0.28.1 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/google/uuid v1.3.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading github.com/google/gofuzz v1.2.0 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading golang.org/x/sys v0.13.0 go: downloading github.com/pkg/errors v0.9.1 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading github.com/kr/fs v0.1.0 go: downloading golang.org/x/term v0.13.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading golang.org/x/time v0.3.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading golang.org/x/text v0.13.0 go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading google.golang.org/protobuf v1.31.0 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading github.com/google/go-cmp v0.5.9 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/containerd/containerd v1.7.5 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/docker/go-units v0.5.0 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading github.com/morikuni/aec v1.0.0 go: downloading google.golang.org/appengine v1.6.7 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-metrics v0.0.1 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading github.com/moby/locker v1.0.1 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/oklog/ulid v1.3.1 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading github.com/google/logger v1.1.1 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0117 00:18:11.243382 38199 addon.go:250] addon test wants to update all nodes I0117 00:18:11.244528 38199 addon.go:250] addon test wants to update workers nodes I0117 00:18:11.244681 38199 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0117 00:18:11.244830 38199 addon.go:283] installing PKI for "test" I0117 00:18:11.465874 38199 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.29s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.00s) PASS ok k8s.io/kops/channels/pkg/channels 0.332s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.047s ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN TestCreateClusterMinimal I0117 00:18:12.766987 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.767174 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.767212 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.767252 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.767283 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.767335 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.767379 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.767395 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.767425 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.767465 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.772403 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.772462 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.793580 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.793716 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.793988 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.801765 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.801823 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.801840 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.801862 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.801878 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.801896 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.801914 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.801922 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.801937 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.801947 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.804687 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.804716 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.827714 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.827880 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.828106 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.831492 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.831548 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.831566 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.831593 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.831627 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.831657 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.831680 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.831696 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.831720 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.831736 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.834431 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.834456 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.852182 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.852292 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.852499 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.858924 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.858987 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.859005 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.859033 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.859048 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.859070 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.859090 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.859100 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.859123 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.859136 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.862168 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.862213 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.872757 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.872980 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.873325 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.879094 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.879177 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.879201 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.879236 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.879262 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.879289 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.879315 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.879334 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.879356 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.879380 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.882514 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.882586 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.908599 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.908758 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.909042 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.914267 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.914344 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.914364 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.914396 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.914417 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.914444 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.914469 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.914483 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.914505 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.914526 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.918318 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.918359 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.939977 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.940062 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.940323 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:12.944856 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.944914 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.944932 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.944954 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.944977 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.944999 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.945020 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.945031 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.945050 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.945065 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.948461 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.948493 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.964278 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:12.964401 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:12.964643 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.20s) === RUN TestCreateClusterHetzner I0117 00:18:12.971297 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:12.971395 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:12.971416 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:12.971442 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:12.971459 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:12.971482 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:12.971506 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:12.971518 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:12.971535 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:12.971557 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:12.975389 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:12.975450 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.003863 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.003932 39591 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0117 00:18:13.012495 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.012609 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.012646 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.012723 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.012759 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.012815 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.012852 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.012887 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.012939 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.012966 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.016389 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.016436 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.087209 39591 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.12s) === RUN TestCreateClusterOpenStack I0117 00:18:13.090887 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.090958 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.090981 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.091013 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.091034 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.091063 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.091089 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.091103 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.091139 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.091158 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.094713 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.094765 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.147369 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.147415 39591 new_cluster.go:1373] Cloud Provider ID: "openstack" I0117 00:18:13.149693 39591 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.07s) === RUN TestCreateClusterOpenStackOctavia I0117 00:18:13.159776 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.159888 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.159918 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.159959 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.159987 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.160024 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.160054 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.160076 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.160105 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.160148 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.163654 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.163694 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.179592 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.179629 39591 new_cluster.go:1373] Cloud Provider ID: "openstack" I0117 00:18:13.180871 39591 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0117 00:18:13.180885 39591 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.03s) === RUN TestCreateClusterOpenStackNoDNS I0117 00:18:13.191174 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.191284 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.191314 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.191349 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.191376 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.191410 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.191455 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.191476 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.191501 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.191521 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.195719 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.195769 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.220733 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.220784 39591 new_cluster.go:1373] Cloud Provider ID: "openstack" I0117 00:18:13.220841 39591 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0117 00:18:13.220865 39591 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.04s) === RUN TestCreateClusterCilium I0117 00:18:13.231059 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.231188 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.231219 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.231251 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.231277 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.231312 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.231342 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.231363 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.231397 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.231418 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.234283 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.234319 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.254522 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.254694 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:13.255009 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.03s) === RUN TestCreateClusterOverride I0117 00:18:13.260521 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.260599 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.260621 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.260650 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.260671 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.260698 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.260725 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.260740 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.260763 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.260780 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.263379 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.263412 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.276538 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.276865 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:13.277050 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.02s) === RUN TestCreateClusterKubernetesFeatureGates I0117 00:18:13.280899 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.280970 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.280992 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.281017 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.281036 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.281060 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.281083 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.281096 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.281133 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.281150 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.283355 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.283379 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.305266 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.305377 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:13.305638 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.03s) === RUN TestCreateClusterComplex I0117 00:18:13.311320 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.311380 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.311396 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.311414 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.311428 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.311445 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.311470 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.311479 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.311493 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.311504 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.325661 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.325697 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.360104 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.360308 39591 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0117 00:18:13.360315 39591 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0117 00:18:13.360322 39591 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0117 00:18:13.360562 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.06s) === RUN TestCreateClusterComplexPrivate I0117 00:18:13.366600 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.366656 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.366670 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.366687 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.366701 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.366718 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.366735 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.366744 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.366758 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.366769 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.369092 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.369177 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.399429 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.399674 39591 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0117 00:18:13.399686 39591 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0117 00:18:13.399691 39591 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0117 00:18:13.399696 39591 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0117 00:18:13.399701 39591 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0117 00:18:13.399706 39591 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0117 00:18:13.399710 39591 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0117 00:18:13.399717 39591 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0117 00:18:13.399722 39591 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0117 00:18:13.399729 39591 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0117 00:18:13.400024 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.04s) === RUN TestCreateClusterHA I0117 00:18:13.407533 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.407593 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.407609 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.407630 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.407653 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.407672 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.407695 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.407704 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.407723 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.407735 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.409840 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.409863 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.446809 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.447013 39591 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0117 00:18:13.447022 39591 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0117 00:18:13.447027 39591 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0117 00:18:13.447246 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:13.456470 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.456537 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.456557 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.456581 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.456599 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.456623 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.456645 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.456657 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.456675 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.456688 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.459749 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.459795 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.487660 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.487910 39591 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0117 00:18:13.487920 39591 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0117 00:18:13.487926 39591 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0117 00:18:13.488222 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.09s) === RUN TestCreateClusterMinimalGCE I0117 00:18:13.496671 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.496766 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.496793 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.496818 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.496834 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.496856 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.496875 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.496888 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.496918 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.496974 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.499426 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.499477 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.555085 39591 new_cluster.go:1373] Cloud Provider ID: "gce" I0117 00:18:13.555239 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0117 00:18:13.560455 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.560519 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.560548 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.560586 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.560621 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.560658 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.560690 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.560716 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.560754 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.560775 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.565730 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.565798 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.583654 39591 new_cluster.go:1373] Cloud Provider ID: "gce" I0117 00:18:13.583745 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.09s) === RUN TestCreateClusterHAGCE I0117 00:18:13.590630 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.590727 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.590756 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.590808 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.590837 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.590875 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.590905 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.590925 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.590951 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.590971 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.594337 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.594400 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.634192 39591 new_cluster.go:1373] Cloud Provider ID: "gce" I0117 00:18:13.634314 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.06s) === RUN TestCreateClusterGCE I0117 00:18:13.647331 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.647453 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.647485 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.647529 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.647559 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.647603 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.647638 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.647659 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.647704 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.647726 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.652138 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.652201 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.678321 39591 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0117 00:18:13.678419 39591 new_cluster.go:1373] Cloud Provider ID: "gce" I0117 00:18:13.678517 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.04s) === RUN TestCreateClusterHASharedZone I0117 00:18:13.686308 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.686419 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.686473 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.686508 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.686536 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.686572 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.686606 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.686629 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.686660 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.686682 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.691619 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.691674 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.719171 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.719226 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.719513 39591 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0117 00:18:13.719850 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.04s) === RUN TestCreateClusterHASharedZones I0117 00:18:13.727890 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.727979 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.728004 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.728033 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.728056 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.728085 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.728111 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.728141 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.728169 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.728194 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.732210 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.732260 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0117 00:18:13.774825 39591 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0117 00:18:13.774895 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.775321 39591 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0117 00:18:13.775340 39591 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0117 00:18:13.775723 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.06s) === RUN TestCreateClusterPrivate I0117 00:18:13.786759 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.786848 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.786873 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.786912 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.786936 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.786963 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.786987 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.787002 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.787024 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.787043 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.791045 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.791084 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.833282 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.833448 39591 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0117 00:18:13.833462 39591 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0117 00:18:13.833733 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:13.833769 39591 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.06s) === RUN TestCreateClusterPrivateGCE I0117 00:18:13.844667 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.844782 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.844812 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.844850 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.844878 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.844915 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.844949 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.844970 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.844998 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.845020 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.849662 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.849719 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.866614 39591 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0117 00:18:13.866709 39591 new_cluster.go:1373] Cloud Provider ID: "gce" I0117 00:18:13.866813 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.03s) === RUN TestCreateClusterWithNGWSpecified I0117 00:18:13.875577 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.875682 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.875711 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.875744 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.875770 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.875802 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.875834 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.875856 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.875890 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.875909 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.880086 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.880154 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.942297 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:13.942509 39591 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0117 00:18:13.942526 39591 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0117 00:18:13.942793 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:13.942819 39591 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.07s) === RUN TestCreateClusterWithINGWSpecified I0117 00:18:13.948311 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:13.948376 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:13.948394 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:13.948416 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:13.948432 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:13.948453 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:13.948475 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:13.948486 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:13.948503 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:13.948517 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:13.952274 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:13.952347 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.024510 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.024689 39591 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0117 00:18:14.024704 39591 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0117 00:18:14.024948 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:14.024971 39591 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.08s) === RUN TestCreateClusterSharedVPC I0117 00:18:14.030093 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.030168 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.030186 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.030208 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.030225 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.030246 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.030266 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.030278 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.030295 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.030307 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.034080 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.034173 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.115732 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.115873 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.115908 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.115930 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.115942 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.115971 39591 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0117 00:18:14.116195 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.09s) === RUN TestCreateClusterSharedSubnets I0117 00:18:14.120195 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.120261 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.120277 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.120296 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.120313 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.120333 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.120351 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.120361 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.120377 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.120389 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.123376 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.123402 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.129935 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.130009 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.130105 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.130342 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.130373 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.130415 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.130448 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.130744 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.02s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0117 00:18:14.139288 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.139391 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.139418 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.139452 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.139480 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.139520 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.139554 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.139576 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.139602 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.139622 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.143983 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.144019 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.168392 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:14.168419 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.168443 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.168496 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.168584 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.168597 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.168612 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.168620 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.168789 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.03s) === RUN TestCreateClusterPrivateSharedSubnets I0117 00:18:14.172686 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.172737 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.172752 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.172767 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.172783 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.172802 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.172820 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.172830 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.172845 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.172857 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.176703 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.176754 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.202187 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.202227 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.202279 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.202298 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.202361 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.202525 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.202548 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.202574 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:18:14.202591 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:18:14.202938 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.04s) === RUN TestCreateClusterIPv6 I0117 00:18:14.210456 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.210557 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.210585 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.210616 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.210643 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.210679 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.210709 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.210729 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.210758 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.210778 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.214801 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.214857 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.239636 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.239846 39591 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0117 00:18:14.239870 39591 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0117 00:18:14.240764 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.04s) === RUN TestCreateClusterDifferentAMIs I0117 00:18:14.248851 39591 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0117 00:18:14.248868 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.248958 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.248985 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.249018 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.249048 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.249082 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.249128 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.249157 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.249190 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.249210 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.253358 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.253403 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.274748 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.274849 39591 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0117 00:18:14.274869 39591 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0117 00:18:14.275223 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:14.283371 39591 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.03s) === RUN TestCreateClusterKarpenter I0117 00:18:14.283477 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.283558 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.283581 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.283609 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.283633 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.283663 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.283690 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.283706 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.283730 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.283747 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.287531 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.287571 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0117 00:18:14.308405 39591 new_cluster.go:1373] Cloud Provider ID: "aws" I0117 00:18:14.308563 39591 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0117 00:18:14.308579 39591 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0117 00:18:14.308588 39591 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0117 00:18:14.308831 39591 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.03s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0117 00:18:14.317332 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.317392 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.317411 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.317467 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.317487 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.317510 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.317534 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.317547 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.317568 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.317584 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.322289 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.01s) === RUN TestMinimal I0117 00:18:14.323366 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:14.323427 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:14.323446 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:14.323471 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:14.323488 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:14.323507 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:14.323524 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:14.323537 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:14.323554 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:14.323564 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:14.335175 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:18:14.336627 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:14.336665 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:18:18.548421 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:20.567129 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:18:20.568502 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:20.568531 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:20.568603 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:20.569527 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:18:20.572861 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:18:20.573266 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:20.573593 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:20.573773 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:20.573811 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:20.573848 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:18:20.574042 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:18:20.574391 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:18:20.580470 39591 target.go:111] Terraform output is in /tmp/test2239985544/out --- PASS: TestMinimal (6.26s) === RUN TestMinimal_v1_23 I0117 00:18:20.586928 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:20.587063 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:20.587102 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:20.587163 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:20.587197 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:20.587237 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:20.587276 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:20.587300 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:20.587332 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:20.587356 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:20.605698 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0117 00:18:20.607832 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:20.607890 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.817042 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:21.930632 39591 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0117 00:18:21.931703 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:21.931731 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:21.931824 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:21.933634 39591 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0117 00:18:21.937757 39591 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0117 00:18:21.937980 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.938270 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.938540 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.938662 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.938757 39591 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0117 00:18:21.938988 39591 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0117 00:18:21.939222 39591 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0117 00:18:21.943459 39591 target.go:111] Terraform output is in /tmp/test177701993/out --- PASS: TestMinimal_v1_23 (1.36s) === RUN TestMinimal_v1_24 I0117 00:18:21.947260 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:21.947396 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:21.947437 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:21.947500 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:21.947560 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:21.947625 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:21.947670 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:21.947708 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:21.947759 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:21.947792 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:21.966565 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:18:21.968473 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:21.968535 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:22.912373 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:23.039746 39591 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0117 00:18:23.040454 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:23.040484 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:23.040562 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:23.042914 39591 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0117 00:18:23.050304 39591 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0117 00:18:23.050634 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:23.051092 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:23.051277 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:23.051506 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:23.051622 39591 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0117 00:18:23.051899 39591 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0117 00:18:23.052237 39591 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0117 00:18:23.056898 39591 target.go:111] Terraform output is in /tmp/test3554070975/out --- PASS: TestMinimal_v1_24 (1.11s) === RUN TestMinimal_v1_25 I0117 00:18:23.059448 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:23.059518 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:23.059540 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:23.059572 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:23.059612 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:23.059653 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:23.059688 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:23.059710 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:23.059740 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:23.059758 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:23.072203 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:18:23.073902 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:23.073947 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.006801 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:24.135630 39591 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0117 00:18:24.135947 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:24.135976 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:24.136062 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:24.143344 39591 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0117 00:18:24.146135 39591 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0117 00:18:24.146312 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.146633 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.146889 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.147332 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.147426 39591 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0117 00:18:24.147693 39591 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0117 00:18:24.147908 39591 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0117 00:18:24.152028 39591 target.go:111] Terraform output is in /tmp/test1617130909/out --- PASS: TestMinimal_v1_25 (1.10s) === RUN TestMinimal_v1_26 I0117 00:18:24.155699 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:24.155800 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:24.155830 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:24.155862 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:24.155891 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:24.155935 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:24.155967 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:24.155987 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:24.156016 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:24.156036 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:24.175992 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:18:24.178597 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:24.178661 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.115750 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:25.278471 39591 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0117 00:18:25.280146 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:25.280190 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:25.280306 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:25.283173 39591 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0117 00:18:25.288729 39591 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0117 00:18:25.288951 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.289244 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.289348 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.289801 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.289897 39591 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0117 00:18:25.290177 39591 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0117 00:18:25.290342 39591 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0117 00:18:25.294595 39591 target.go:111] Terraform output is in /tmp/test465897837/out --- PASS: TestMinimal_v1_26 (1.14s) === RUN TestMinimal_v1_27 I0117 00:18:25.298184 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:25.298283 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:25.298311 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:25.298346 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:25.298373 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:25.298407 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:25.298438 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:25.298464 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:25.298493 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:25.298517 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:25.318387 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:18:25.320911 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:25.320971 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.278307 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:27.439996 39591 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0117 00:18:27.441969 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:27.441991 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:27.442049 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:27.443472 39591 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0117 00:18:27.447665 39591 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0117 00:18:27.447954 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.448128 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.450460 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.450681 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.450947 39591 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0117 00:18:27.451670 39591 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0117 00:18:27.453400 39591 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0117 00:18:27.457759 39591 target.go:111] Terraform output is in /tmp/test2189823684/out --- PASS: TestMinimal_v1_27 (2.16s) === RUN TestMinimal_NoneDNS I0117 00:18:27.461327 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:27.461428 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:27.461456 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:27.461491 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:27.461521 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:27.461557 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:27.461588 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:27.461609 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:27.461637 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:27.461657 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:18:27.484586 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:27.484652 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:28.182811 39591 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0117 00:18:28.187529 39591 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0117 00:18:28.191987 39591 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0117 00:18:28.192753 39591 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0117 00:18:28.192812 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:28.192880 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:28.193000 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:28.193094 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:28.197162 39591 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0117 00:18:28.197375 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:28.197587 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:28.197948 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:28.198014 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:28.198078 39591 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0117 00:18:28.198311 39591 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0117 00:18:28.198543 39591 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0117 00:18:28.203037 39591 target.go:111] Terraform output is in /tmp/test585546690/out --- PASS: TestMinimal_NoneDNS (0.75s) === RUN TestHetzner I0117 00:18:28.206597 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:29.244080 39591 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0117 00:18:29.247748 39591 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0117 00:18:29.248490 39591 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0117 00:18:29.254492 39591 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0117 00:18:29.255412 39591 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0117 00:18:29.257368 39591 target.go:111] Terraform output is in /tmp/test1904215144/out --- PASS: TestHetzner (1.05s) === RUN TestNvidia I0117 00:18:29.260211 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:29.260323 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:29.260357 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:29.260397 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:29.260431 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:29.260472 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:29.260508 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:29.260531 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:29.260560 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:29.260583 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:29.279976 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:29.282596 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:29.282665 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.217951 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:30.357981 39591 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0117 00:18:30.358614 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:30.358654 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:30.358729 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:30.361471 39591 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0117 00:18:30.366449 39591 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0117 00:18:30.366810 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.367024 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.367235 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.367615 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.367712 39591 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0117 00:18:30.367978 39591 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0117 00:18:30.368243 39591 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0117 00:18:30.372338 39591 target.go:111] Terraform output is in /tmp/test1914221689/out --- PASS: TestNvidia (1.12s) === RUN TestMinimalGossip I0117 00:18:30.376094 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.376221 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:30.376254 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:30.376293 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:30.376323 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:30.376363 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:30.376397 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:30.376419 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:30.376448 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:30.376470 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:30.397261 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:30.397326 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.043790 39591 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0117 00:18:31.046769 39591 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0117 00:18:31.051101 39591 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0117 00:18:31.051319 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.051495 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.051607 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.051860 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.051942 39591 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0117 00:18:31.052133 39591 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0117 00:18:31.052339 39591 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0117 00:18:31.056404 39591 target.go:111] Terraform output is in /tmp/test574333728/out --- PASS: TestMinimalGossip (0.68s) === RUN TestMinimalGossipIRSA I0117 00:18:31.060772 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:31.060955 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:31.061011 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:31.061071 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:31.062623 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:31.062741 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:31.063377 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:31.063405 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:31.063441 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:31.063479 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:31.086507 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.086578 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.790494 39591 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0117 00:18:31.793913 39591 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0117 00:18:31.797412 39591 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0117 00:18:31.797716 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.797889 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.798125 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.798348 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:31.798443 39591 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0117 00:18:31.798630 39591 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0117 00:18:31.798796 39591 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0117 00:18:31.803332 39591 target.go:111] Terraform output is in /tmp/test684394733/out --- PASS: TestMinimalGossipIRSA (0.75s) === RUN TestMinimalGCE I0117 00:18:31.807554 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:31.808882 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:32.925645 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:32.925720 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:32.925818 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0117 00:18:32.925835 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0117 00:18:32.925847 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0117 00:18:32.925888 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:18:32.926811 39591 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0117 00:18:32.933303 39591 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0117 00:18:32.938161 39591 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0117 00:18:32.939009 39591 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0117 00:18:32.939237 39591 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0117 00:18:32.941595 39591 target.go:111] Terraform output is in /tmp/test1094378761/out --- PASS: TestMinimalGCE (1.14s) === RUN TestMinimalGCEPrivate I0117 00:18:32.944326 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:32.945698 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:33.888424 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:33.888511 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:33.888608 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0117 00:18:33.888626 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0117 00:18:33.888644 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0117 00:18:33.888694 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:18:33.889832 39591 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0117 00:18:33.892769 39591 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0117 00:18:33.897967 39591 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0117 00:18:33.898807 39591 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0117 00:18:33.898970 39591 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0117 00:18:33.901613 39591 target.go:111] Terraform output is in /tmp/test2850496435/out --- PASS: TestMinimalGCEPrivate (0.96s) === RUN TestMinimalGCEInternalLoadBalancer I0117 00:18:33.904329 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:33.905792 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:34.852649 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:34.852700 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:34.852787 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0117 00:18:34.852801 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0117 00:18:34.852815 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0117 00:18:34.852855 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0117 00:18:34.852883 39591 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0117 00:18:34.853806 39591 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0117 00:18:34.856605 39591 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0117 00:18:34.857006 39591 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0117 00:18:34.857236 39591 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0117 00:18:34.861205 39591 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0117 00:18:34.861924 39591 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0117 00:18:34.862058 39591 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0117 00:18:34.862281 39591 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0117 00:18:34.862442 39591 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0117 00:18:34.864993 39591 target.go:111] Terraform output is in /tmp/test303330879/out --- PASS: TestMinimalGCEInternalLoadBalancer (0.96s) === RUN TestMinimalGCEPublicLoadBalancer I0117 00:18:34.868023 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:34.869461 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:35.806090 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:35.806157 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:35.806256 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0117 00:18:35.806275 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0117 00:18:35.806289 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0117 00:18:35.806332 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:18:35.807455 39591 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0117 00:18:35.809830 39591 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0117 00:18:35.813669 39591 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0117 00:18:35.814247 39591 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0117 00:18:35.814335 39591 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0117 00:18:35.816208 39591 target.go:111] Terraform output is in /tmp/test1181986458/out --- PASS: TestMinimalGCEPublicLoadBalancer (0.95s) === RUN TestMinimalGCELongClusterName I0117 00:18:35.817899 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:35.818829 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:36.723237 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:36.723324 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:36.723415 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0117 00:18:36.723430 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0117 00:18:36.723442 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0117 00:18:36.723488 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:18:36.724290 39591 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0117 00:18:36.727283 39591 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0117 00:18:36.730197 39591 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0117 00:18:36.730735 39591 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0117 00:18:36.730824 39591 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0117 00:18:36.732188 39591 target.go:111] Terraform output is in /tmp/test1378013451/out --- PASS: TestMinimalGCELongClusterName (0.92s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0117 00:18:36.733507 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:36.734323 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:37.624909 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:37.624967 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:37.625084 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0117 00:18:37.625098 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0117 00:18:37.625112 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0117 00:18:37.625164 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0117 00:18:37.625217 39591 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0117 00:18:37.626171 39591 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0117 00:18:37.631127 39591 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0117 00:18:37.631586 39591 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0117 00:18:37.631711 39591 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0117 00:18:37.633712 39591 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0117 00:18:37.634126 39591 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0117 00:18:37.634229 39591 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0117 00:18:37.634323 39591 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0117 00:18:37.634428 39591 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0117 00:18:37.636376 39591 target.go:111] Terraform output is in /tmp/test3478567667/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (0.90s) === RUN TestMinimalGCEDNSNone I0117 00:18:37.638129 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:37.639150 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:38.527385 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:38.527427 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:38.527498 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0117 00:18:38.527510 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0117 00:18:38.527520 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0117 00:18:38.527549 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0117 00:18:38.527570 39591 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0117 00:18:38.528325 39591 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0117 00:18:38.533207 39591 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0117 00:18:38.533564 39591 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0117 00:18:38.533712 39591 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0117 00:18:38.537941 39591 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0117 00:18:38.538719 39591 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0117 00:18:38.538838 39591 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0117 00:18:38.538992 39591 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0117 00:18:38.539177 39591 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0117 00:18:38.542616 39591 target.go:111] Terraform output is in /tmp/test4167517729/out --- PASS: TestMinimalGCEDNSNone (0.91s) === RUN TestMinimalScaleway I0117 00:18:38.545540 39591 featureflag.go:164] FeatureFlag "Scaleway"=true I0117 00:18:38.545555 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:39.653177 39591 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0117 00:18:39.660157 39591 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0117 00:18:39.664053 39591 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0117 00:18:39.665213 39591 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0117 00:18:39.667466 39591 target.go:111] Terraform output is in /tmp/test3187429412/out I0117 00:18:39.670629 39591 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (1.13s) === RUN TestHA I0117 00:18:39.670727 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:39.670837 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:39.670870 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:39.670910 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:39.670950 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:39.670992 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:39.671033 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:39.671058 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:39.671095 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:39.671134 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:39.696882 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:39.699339 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:39.699392 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:39.699423 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:39.699458 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.263244 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:40.385328 39591 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0117 00:18:40.386931 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:40.386962 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:40.387037 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:40.388697 39591 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0117 00:18:40.397318 39591 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0117 00:18:40.397644 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.397899 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398222 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398342 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398533 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398630 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398691 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398756 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:40.398867 39591 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0117 00:18:40.399316 39591 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0117 00:18:40.399589 39591 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0117 00:18:40.405392 39591 target.go:111] Terraform output is in /tmp/test210747414/out --- PASS: TestHA (0.74s) === RUN TestHighAvailabilityGCE I0117 00:18:40.409843 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:40.411372 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:18:41.392402 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:18:41.392472 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:18:41.392597 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0117 00:18:41.392615 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0117 00:18:41.392632 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0117 00:18:41.392677 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0117 00:18:41.392728 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0117 00:18:41.392769 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:18:41.393971 39591 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0117 00:18:41.397424 39591 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0117 00:18:41.406243 39591 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0117 00:18:41.406996 39591 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0117 00:18:41.407219 39591 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0117 00:18:41.410770 39591 target.go:111] Terraform output is in /tmp/test4187271067/out --- PASS: TestHighAvailabilityGCE (1.00s) === RUN TestComplex I0117 00:18:41.414336 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:41.414442 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:41.414475 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:41.414550 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:41.414581 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:41.414618 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:41.414652 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:41.414673 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:41.414702 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:41.414723 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:41.439995 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:18:41.442973 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:41.443043 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.374811 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.535550 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:18:42.536264 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:42.536318 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:42.536431 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:42.539299 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:18:42.542346 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:18:42.543552 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:18:42.543787 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:18:42.543919 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:42.543997 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:42.544098 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:42.544177 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:42.548506 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:18:42.548644 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.548830 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.549022 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.549539 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.549639 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:18:42.549866 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:18:42.550214 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:18:42.555870 39591 target.go:111] Terraform output is in /tmp/test2327870539/out I0117 00:18:42.559603 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:42.559697 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:42.559731 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:42.559775 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:42.559806 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:42.559847 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:42.559880 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:42.559901 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:42.559930 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:42.559951 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:42.587852 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:18:42.590403 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:42.590464 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.159177 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:43.313652 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:18:43.315414 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:43.315442 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:43.315515 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:43.316158 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:18:43.318613 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:18:43.321170 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:18:43.321722 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:18:43.321798 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:43.321928 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:43.322399 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:43.322542 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:43.328549 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:18:43.328701 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.328852 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.329148 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.329515 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.329615 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:18:43.329852 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:18:43.330098 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:18:43.335568 39591 target.go:111] Terraform output is in /tmp/test1033421061/out --- PASS: TestComplex (1.92s) === RUN TestCompress I0117 00:18:43.339330 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:43.339447 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:43.339479 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:43.339523 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:43.339555 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:43.339593 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:43.339625 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:43.339648 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:43.339684 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:43.339705 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:43.358377 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:43.361750 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.361836 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:43.927482 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:44.057336 39591 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0117 00:18:44.059379 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:44.059418 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:44.059516 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:44.062994 39591 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0117 00:18:44.068184 39591 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0117 00:18:44.068411 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.068764 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.069701 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.069825 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.069927 39591 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0117 00:18:44.070173 39591 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0117 00:18:44.070369 39591 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0117 00:18:44.074548 39591 target.go:111] Terraform output is in /tmp/test2873054927/out --- PASS: TestCompress (0.74s) === RUN TestExternalPolicies I0117 00:18:44.078452 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:44.078559 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:44.078591 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:44.078629 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:44.078664 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:44.078707 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:44.078739 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:44.078764 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:44.078795 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:44.078817 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:44.100527 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:44.103415 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.103484 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.665706 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:44.812817 39591 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0117 00:18:44.816148 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:44.816197 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:44.816292 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:44.820736 39591 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0117 00:18:44.823496 39591 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0117 00:18:44.824069 39591 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0117 00:18:44.824139 39591 api.go:53] PageSize not implemented W0117 00:18:44.824164 39591 api.go:53] PageSize not implemented I0117 00:18:44.829435 39591 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0117 00:18:44.829662 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.829871 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.830275 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.830354 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.830465 39591 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0117 00:18:44.830757 39591 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0117 00:18:44.831063 39591 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0117 00:18:44.835910 39591 target.go:111] Terraform output is in /tmp/test2599526164/out --- PASS: TestExternalPolicies (0.76s) === RUN TestMinimalIPv6 I0117 00:18:44.839743 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:44.839850 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:44.839884 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:44.839922 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:44.839952 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:44.839996 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:44.840067 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:44.840090 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:44.840135 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:44.840159 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:44.863458 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:44.866958 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:44.867023 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.432775 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:45.590453 39591 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0117 00:18:45.593150 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:45.593176 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:45.593245 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:45.598687 39591 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0117 00:18:45.601143 39591 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0117 00:18:45.601727 39591 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0117 00:18:45.602032 39591 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0117 00:18:45.602138 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:45.602205 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:45.602316 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:45.602407 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:45.606789 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:18:45.606945 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.607142 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.607351 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.607642 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.607734 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:18:45.607980 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:18:45.608252 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:18:45.613145 39591 target.go:111] Terraform output is in /tmp/test4045577318/out --- PASS: TestMinimalIPv6 (0.78s) === RUN TestMinimalIPv6Calico I0117 00:18:45.617136 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:45.617235 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:45.617264 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:45.617299 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:45.617327 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:45.617361 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:45.617425 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:45.617447 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:45.617475 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:45.617496 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:45.639151 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:45.642023 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:45.642085 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.202267 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:46.547482 39591 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0117 00:18:46.550694 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:46.550767 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:46.550876 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:46.555608 39591 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0117 00:18:46.558245 39591 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0117 00:18:46.559580 39591 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0117 00:18:46.559839 39591 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0117 00:18:46.559926 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:46.559992 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:46.560087 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:46.560154 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:46.564223 39591 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0117 00:18:46.564354 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.564543 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.564888 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.564945 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.565025 39591 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0117 00:18:46.565247 39591 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0117 00:18:46.565420 39591 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0117 00:18:46.570785 39591 target.go:111] Terraform output is in /tmp/test14397858/out --- PASS: TestMinimalIPv6Calico (0.96s) === RUN TestMinimalIPv6Cilium I0117 00:18:46.575145 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:46.575245 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:46.575276 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:46.575312 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:46.575340 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:46.575374 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:46.575438 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:46.575459 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:46.575488 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:46.575508 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:46.601917 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:46.605129 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:46.605198 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.168947 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:47.359815 39591 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0117 00:18:47.360356 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:47.360408 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:47.360519 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:47.363495 39591 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0117 00:18:47.366004 39591 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0117 00:18:47.369334 39591 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0117 00:18:47.370619 39591 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0117 00:18:47.371165 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:47.372593 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:47.372691 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:47.372759 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:47.377169 39591 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0117 00:18:47.377313 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.377508 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.377665 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.378090 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.378212 39591 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0117 00:18:47.378497 39591 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0117 00:18:47.378796 39591 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0117 00:18:47.384526 39591 target.go:111] Terraform output is in /tmp/test628030650/out --- PASS: TestMinimalIPv6Cilium (0.81s) === RUN TestMinimalIPv6NoSubnetPrefix I0117 00:18:47.388544 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:47.388657 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:47.388690 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:47.388764 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:47.388796 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:47.388838 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:47.388874 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:47.388898 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:47.388929 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:47.388951 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:47.411739 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:47.414987 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.415054 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:47.976369 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:48.125363 39591 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0117 00:18:48.128729 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:48.128770 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:48.128930 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:48.133580 39591 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0117 00:18:48.136354 39591 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0117 00:18:48.137225 39591 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0117 00:18:48.137513 39591 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0117 00:18:48.137656 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:48.137735 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:48.137850 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:18:48.137910 39591 loadbalancers.go:35] PageSize not implemented I0117 00:18:48.141923 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:18:48.142085 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.142310 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.142465 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.142898 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.142985 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:18:48.143266 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:18:48.143490 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:18:48.149032 39591 target.go:111] Terraform output is in /tmp/test2185692818/out --- PASS: TestMinimalIPv6NoSubnetPrefix (0.76s) === RUN TestMinimalWarmPool I0117 00:18:48.153056 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:48.153209 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:48.153250 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:48.153307 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:48.153361 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:48.153429 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:48.153477 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:48.153519 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:48.153574 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:48.153610 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:48.173574 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:48.176535 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.176614 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.738458 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:48.922543 39591 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0117 00:18:48.925918 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:48.925949 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:48.926025 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:48.926708 39591 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0117 00:18:48.931076 39591 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0117 00:18:48.931545 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.931779 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.932024 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.932383 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.932484 39591 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0117 00:18:48.932739 39591 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0117 00:18:48.933024 39591 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0117 00:18:48.937219 39591 target.go:111] Terraform output is in /tmp/test2756152405/out --- PASS: TestMinimalWarmPool (0.79s) === RUN TestMinimalEtcd I0117 00:18:48.941148 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:48.941255 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:48.941288 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:48.941325 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:48.941355 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:48.941399 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:48.941433 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:48.941455 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:48.941484 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:48.941506 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:48.966741 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:48.969479 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:48.969566 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.529167 39591 zones.go:93] ListHostedZonesPages { } W0117 00:18:49.662308 39591 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0117 00:18:49.662357 39591 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0117 00:18:49.664639 39591 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0117 00:18:49.674379 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:18:49.675044 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:49.675095 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:49.675242 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:49.678050 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:18:49.682550 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:18:49.682925 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.683157 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.683384 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.684972 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.685165 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:18:49.686090 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:18:49.686843 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:18:49.693227 39591 target.go:111] Terraform output is in /tmp/test826706935/out --- PASS: TestMinimalEtcd (0.76s) === RUN TestMinimalGp3 I0117 00:18:49.697140 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:49.697254 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:49.697286 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:49.697327 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:49.697359 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:49.697402 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:49.697439 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:49.697462 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:49.697494 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:49.697517 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:49.717367 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:49.720011 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:49.720081 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.281101 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:50.403682 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:18:50.406717 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:50.406753 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:50.406860 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:50.410247 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:18:50.415718 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:18:50.416080 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.416310 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.416698 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.416777 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.416847 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:18:50.417095 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:18:50.417380 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:18:50.421732 39591 target.go:111] Terraform output is in /tmp/test2562266/out --- PASS: TestMinimalGp3 (0.73s) === RUN TestMinimalLongClusterName I0117 00:18:50.425626 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:50.425742 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:50.425775 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:50.425815 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:50.425847 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:50.425891 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:50.425928 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:50.425951 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:50.425983 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:50.426006 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:50.445217 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:50.447861 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:50.447930 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:18:51.014140 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:51.162083 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:18:51.165214 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:51.165248 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:51.165328 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:51.166781 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:18:51.171197 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:18:51.172523 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.172981 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.173828 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.174231 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.174450 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:18:51.175289 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:18:51.176236 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:18:51.182985 39591 target.go:111] Terraform output is in /tmp/test3120198213/out --- PASS: TestMinimalLongClusterName (0.76s) === RUN TestExistingSG I0117 00:18:51.187018 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:51.187157 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:51.187191 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:51.187234 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:51.187267 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:51.187311 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:51.187349 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:51.187372 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:51.187405 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:51.187428 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:51.214046 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:51.217077 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.217157 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.217200 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.217237 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.778702 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:51.939586 39591 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0117 00:18:51.940912 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:51.940944 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:51.941025 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:51.942782 39591 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0117 00:18:51.945337 39591 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0117 00:18:51.946286 39591 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0117 00:18:51.946393 39591 api.go:53] PageSize not implemented W0117 00:18:51.946462 39591 api.go:53] PageSize not implemented W0117 00:18:51.946506 39591 api.go:53] PageSize not implemented W0117 00:18:51.946626 39591 api.go:53] PageSize not implemented I0117 00:18:51.950798 39591 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0117 00:18:51.950985 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951153 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951365 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951550 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951620 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951801 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951894 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.951935 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.952022 39591 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0117 00:18:51.952299 39591 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0117 00:18:51.952633 39591 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0117 00:18:51.959502 39591 target.go:111] Terraform output is in /tmp/test1218793977/out --- PASS: TestExistingSG (0.78s) === RUN TestBastionAdditionalUserData I0117 00:18:51.968252 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:51.968370 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:51.968404 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:51.968443 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:51.968474 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:51.968512 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:51.968547 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:51.968569 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:51.968599 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:51.968621 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:51.991840 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:51.994656 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.994718 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:51.994760 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.553798 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:52.697725 39591 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0117 00:18:52.701038 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:52.701071 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:52.701170 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:52.706209 39591 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0117 00:18:52.709182 39591 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0117 00:18:52.709870 39591 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0117 00:18:52.709927 39591 api.go:53] PageSize not implemented W0117 00:18:52.709951 39591 api.go:53] PageSize not implemented W0117 00:18:52.709996 39591 api.go:53] PageSize not implemented I0117 00:18:52.714158 39591 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0117 00:18:52.714303 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.714449 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.714651 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.714933 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.715020 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.715069 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.715198 39591 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0117 00:18:52.715459 39591 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0117 00:18:52.715775 39591 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0117 00:18:52.721621 39591 target.go:111] Terraform output is in /tmp/test253675676/out --- PASS: TestBastionAdditionalUserData (0.76s) === RUN TestPrivateFlannel I0117 00:18:52.725925 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:52.726034 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:52.726065 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:52.726102 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:52.726161 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:52.726200 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:52.726274 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:52.726298 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:52.726329 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:52.726351 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:52.748651 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:52.751390 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.751455 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:52.751499 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.313806 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:53.480549 39591 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0117 00:18:53.481615 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:53.481646 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:53.481735 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:53.483509 39591 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0117 00:18:53.486465 39591 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0117 00:18:53.487077 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.487263 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.487362 39591 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0117 00:18:53.487461 39591 api.go:53] PageSize not implemented W0117 00:18:53.487525 39591 api.go:53] PageSize not implemented I0117 00:18:53.492158 39591 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0117 00:18:53.492401 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.492620 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.492796 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.493162 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.493247 39591 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0117 00:18:53.493481 39591 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0117 00:18:53.493731 39591 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0117 00:18:53.499679 39591 target.go:111] Terraform output is in /tmp/test2077122767/out --- PASS: TestPrivateFlannel (0.78s) === RUN TestPrivateCalico I0117 00:18:53.503976 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:53.504085 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:53.504131 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:53.504171 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:53.504204 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:53.504248 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:53.504319 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:53.504343 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:53.504373 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:53.504396 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:53.532701 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:53.535722 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.535793 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:53.535838 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.099090 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:54.451525 39591 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0117 00:18:54.453261 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:54.453309 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:54.453394 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:54.457016 39591 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0117 00:18:54.460050 39591 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0117 00:18:54.460452 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.460591 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.460796 39591 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0117 00:18:54.460876 39591 api.go:53] PageSize not implemented W0117 00:18:54.460961 39591 api.go:53] PageSize not implemented I0117 00:18:54.465193 39591 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0117 00:18:54.465402 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.465636 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.466011 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.466104 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.466219 39591 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0117 00:18:54.466565 39591 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0117 00:18:54.466877 39591 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0117 00:18:54.473101 39591 target.go:111] Terraform output is in /tmp/test4197536094/out --- PASS: TestPrivateCalico (0.97s) === RUN TestPrivateCilium I0117 00:18:54.478108 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:54.478244 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:54.478276 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:54.478319 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:54.478351 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:54.478392 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:54.478426 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:54.478450 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:54.478485 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:54.478506 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:54.506690 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:54.510335 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.510408 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:54.510451 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.072214 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:55.250309 39591 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0117 00:18:55.255655 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:55.255697 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:55.255811 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:55.259288 39591 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0117 00:18:55.261990 39591 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0117 00:18:55.262548 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.262695 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.262782 39591 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0117 00:18:55.262824 39591 api.go:53] PageSize not implemented W0117 00:18:55.262916 39591 api.go:53] PageSize not implemented I0117 00:18:55.267124 39591 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0117 00:18:55.267352 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.267523 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.267898 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.267972 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.268046 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:18:55.268299 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:18:55.268531 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:18:55.274075 39591 target.go:111] Terraform output is in /tmp/test1930020895/out --- PASS: TestPrivateCilium (0.80s) === RUN TestPrivateCilium2 I0117 00:18:55.278299 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:55.278412 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:55.278447 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:55.278487 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:55.278521 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:55.278561 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:55.278635 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:55.278658 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:55.278689 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:55.278713 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:55.300983 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:18:55.304081 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.304165 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.304211 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:55.868455 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:56.437612 39591 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0117 00:18:56.438930 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:56.438960 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:56.439037 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:56.446609 39591 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0117 00:18:56.449606 39591 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0117 00:18:56.449973 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.450169 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.450329 39591 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0117 00:18:56.450471 39591 api.go:53] PageSize not implemented W0117 00:18:56.450581 39591 api.go:53] PageSize not implemented I0117 00:18:56.454695 39591 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0117 00:18:56.455032 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.455243 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.455602 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.455669 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.455787 39591 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0117 00:18:56.456015 39591 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0117 00:18:56.456258 39591 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0117 00:18:56.463302 39591 target.go:111] Terraform output is in /tmp/test2387217389/out --- PASS: TestPrivateCilium2 (1.19s) === RUN TestPrivateCiliumAdvanced I0117 00:18:56.471569 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:56.471689 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:56.471721 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:56.471762 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:56.471795 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:56.471836 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:56.471871 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:56.471894 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:56.471927 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:56.471949 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:56.498036 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:56.500753 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.500815 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:56.500852 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.062406 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:57.243240 39591 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0117 00:18:57.246189 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:57.246252 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:57.246340 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:57.251578 39591 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0117 00:18:57.254664 39591 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0117 00:18:57.255274 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.255425 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.255542 39591 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0117 00:18:57.255674 39591 api.go:53] PageSize not implemented W0117 00:18:57.255787 39591 api.go:53] PageSize not implemented I0117 00:18:57.260862 39591 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0117 00:18:57.261008 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.261163 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.261442 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.261841 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.261937 39591 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0117 00:18:57.262216 39591 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0117 00:18:57.262421 39591 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0117 00:18:57.268493 39591 target.go:111] Terraform output is in /tmp/test3638617095/out --- PASS: TestPrivateCiliumAdvanced (0.80s) === RUN TestPrivateCiliumENI I0117 00:18:57.272962 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:57.273076 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:57.273111 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:57.273168 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:57.273201 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:57.273240 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:57.273274 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:57.273299 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:57.273334 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:57.273357 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:57.295531 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:57.298523 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.298591 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.298633 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:57.860514 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:58.049094 39591 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0117 00:18:58.050316 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:58.050346 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:58.050428 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:58.051916 39591 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0117 00:18:58.054772 39591 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0117 00:18:58.055324 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.055468 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.055563 39591 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0117 00:18:58.055621 39591 api.go:53] PageSize not implemented W0117 00:18:58.055735 39591 api.go:53] PageSize not implemented I0117 00:18:58.059740 39591 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0117 00:18:58.059966 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.060154 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.060503 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.061216 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.061685 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:18:58.062291 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:18:58.063170 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:18:58.072042 39591 target.go:111] Terraform output is in /tmp/test430739397/out --- PASS: TestPrivateCiliumENI (0.80s) === RUN TestPrivateCanal I0117 00:18:58.076230 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:58.076345 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:58.076379 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:58.076452 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:58.076484 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:58.076525 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:58.076560 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:58.076582 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:58.076613 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:58.076635 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:58.098909 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:18:58.101750 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.101821 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.101864 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:58.662042 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:59.016796 39591 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0117 00:18:59.018286 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:59.018316 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:59.018398 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:59.019797 39591 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0117 00:18:59.022573 39591 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0117 00:18:59.023060 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.023231 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.023327 39591 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0117 00:18:59.023400 39591 api.go:53] PageSize not implemented W0117 00:18:59.023530 39591 api.go:53] PageSize not implemented I0117 00:18:59.027673 39591 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0117 00:18:59.027889 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.028108 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.028355 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.028739 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.028844 39591 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0117 00:18:59.029104 39591 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0117 00:18:59.029395 39591 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0117 00:18:59.035431 39591 target.go:111] Terraform output is in /tmp/test1213012393/out --- PASS: TestPrivateCanal (0.96s) === RUN TestPrivateKopeio I0117 00:18:59.040266 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:59.040380 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:59.040415 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:59.040453 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:59.040484 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:59.040527 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:59.040563 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:59.040585 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:59.040618 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:59.040644 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:59.070074 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:59.073018 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.073088 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.073151 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.636226 39591 zones.go:93] ListHostedZonesPages { } I0117 00:18:59.787593 39591 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0117 00:18:59.788780 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:18:59.788822 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:18:59.788928 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:18:59.791779 39591 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0117 00:18:59.794062 39591 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0117 00:18:59.794475 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.794630 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.794836 39591 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0117 00:18:59.794981 39591 api.go:53] PageSize not implemented W0117 00:18:59.795106 39591 api.go:53] PageSize not implemented I0117 00:18:59.799290 39591 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0117 00:18:59.799437 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.799616 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.799965 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.800040 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.800102 39591 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0117 00:18:59.800338 39591 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0117 00:18:59.800589 39591 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0117 00:18:59.806211 39591 target.go:111] Terraform output is in /tmp/test469419870/out --- PASS: TestPrivateKopeio (0.78s) === RUN TestUnmanaged I0117 00:18:59.815456 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:59.815579 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:59.815612 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:59.815653 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:59.815686 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:59.815725 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:59.815761 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:59.815782 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:59.815812 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:59.815837 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:59.840068 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:18:59.842950 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.843011 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:18:59.843054 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.402738 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:00.548365 39591 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0117 00:19:00.549014 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:00.549043 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:00.549148 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:00.551090 39591 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0117 00:19:00.553791 39591 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0117 00:19:00.554149 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.554309 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.554409 39591 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0117 00:19:00.554527 39591 api.go:53] PageSize not implemented W0117 00:19:00.554640 39591 api.go:53] PageSize not implemented I0117 00:19:00.558684 39591 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0117 00:19:00.558898 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.559081 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.559272 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.559717 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.559820 39591 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0117 00:19:00.560104 39591 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0117 00:19:00.560386 39591 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0117 00:19:00.571263 39591 target.go:111] Terraform output is in /tmp/test3598429653/out --- PASS: TestUnmanaged (0.76s) === RUN TestPrivateSharedSubnet I0117 00:19:00.575737 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:00.575854 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:00.575887 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:00.575931 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:00.575965 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:00.576007 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:00.576042 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:00.576064 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:00.576095 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:00.576135 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:00.597945 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:00.600740 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.600803 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:00.600846 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.161087 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:01.309021 39591 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0117 00:19:01.311306 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:01.311339 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:01.311424 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:01.311729 39591 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0117 00:19:01.311997 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:01.314361 39591 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0117 00:19:01.314713 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.314904 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.315014 39591 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0117 00:19:01.315088 39591 api.go:53] PageSize not implemented W0117 00:19:01.315154 39591 api.go:53] PageSize not implemented I0117 00:19:01.319307 39591 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0117 00:19:01.319456 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.319724 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.320061 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.320154 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.320224 39591 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0117 00:19:01.320443 39591 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0117 00:19:01.320640 39591 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0117 00:19:01.326013 39591 target.go:111] Terraform output is in /tmp/test810788876/out --- PASS: TestPrivateSharedSubnet (0.76s) === RUN TestPrivateSharedIP I0117 00:19:01.334320 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:01.334443 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:01.334475 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:01.334519 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:01.334551 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:01.334593 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:01.334628 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:01.334648 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:01.334678 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:01.334698 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:01.357498 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:01.360243 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.360306 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.360346 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:01.920909 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:02.052338 39591 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0117 00:19:02.052480 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:02.052496 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:02.052545 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:02.055270 39591 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0117 00:19:02.055521 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:02.057919 39591 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0117 00:19:02.058312 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.058452 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.058992 39591 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0117 00:19:02.059078 39591 api.go:53] PageSize not implemented W0117 00:19:02.059259 39591 api.go:53] PageSize not implemented I0117 00:19:02.063402 39591 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0117 00:19:02.063626 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.063842 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.064217 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.064288 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.064350 39591 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0117 00:19:02.065515 39591 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0117 00:19:02.066392 39591 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0117 00:19:02.075372 39591 target.go:111] Terraform output is in /tmp/test4018370740/out --- PASS: TestPrivateSharedIP (0.75s) === RUN TestPrivateDns1 I0117 00:19:02.079784 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:02.079901 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:02.079933 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:02.079970 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:02.080002 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:02.080041 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:02.080074 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:02.080095 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:02.080142 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:02.080166 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:19:02.104575 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.104639 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.104680 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.857749 39591 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0117 00:19:02.860865 39591 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0117 00:19:02.861288 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0117 00:19:02.861323 39591 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0117 00:19:02.861396 39591 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0117 00:19:02.861409 39591 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0117 00:19:02.861489 39591 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0117 00:19:02.861781 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.861937 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.868853 39591 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0117 00:19:02.868951 39591 api.go:53] PageSize not implemented W0117 00:19:02.869015 39591 api.go:53] PageSize not implemented I0117 00:19:02.873442 39591 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0117 00:19:02.873895 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.874205 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.874397 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.874806 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.874898 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:02.875191 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:02.875464 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:19:02.882223 39591 target.go:111] Terraform output is in /tmp/test2832759896/out --- PASS: TestPrivateDns1 (0.81s) === RUN TestPrivateDns2 I0117 00:19:02.886263 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:02.886377 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:02.886412 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:02.886454 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:02.886484 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:02.886522 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:02.886556 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:02.886579 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:02.886632 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:02.886656 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:02.910986 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.911059 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:02.911104 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.595493 39591 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0117 00:19:03.604483 39591 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0117 00:19:03.604671 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:03.604947 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0117 00:19:03.604988 39591 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0117 00:19:03.605076 39591 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0117 00:19:03.605092 39591 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0117 00:19:03.605184 39591 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0117 00:19:03.605622 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.605791 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.607714 39591 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0117 00:19:03.607786 39591 api.go:53] PageSize not implemented W0117 00:19:03.607830 39591 api.go:53] PageSize not implemented I0117 00:19:03.612157 39591 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0117 00:19:03.612300 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.612577 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.612932 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.613005 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.613100 39591 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0117 00:19:03.613459 39591 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0117 00:19:03.613698 39591 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0117 00:19:03.619751 39591 target.go:111] Terraform output is in /tmp/test3016289832/out --- PASS: TestPrivateDns2 (0.74s) === RUN TestDiscoveryFeatureGate I0117 00:19:03.623940 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:03.624053 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:03.624084 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:03.624134 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:03.624166 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:03.624202 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:03.624270 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:03.624291 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:03.624336 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:03.624362 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:03.644467 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:03.647158 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:03.647225 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.208914 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:04.391364 39591 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0117 00:19:04.392712 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:04.392745 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:04.392825 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:04.394670 39591 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0117 00:19:04.399710 39591 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0117 00:19:04.400143 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.400364 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.400517 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.400957 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.401095 39591 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0117 00:19:04.401359 39591 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0117 00:19:04.401646 39591 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0117 00:19:04.406935 39591 target.go:111] Terraform output is in /tmp/test2226428002/out --- PASS: TestDiscoveryFeatureGate (0.79s) === RUN TestVFSServiceAccountIssuerDiscovery I0117 00:19:04.411796 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:04.411917 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:04.411949 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:04.411986 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:04.412017 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:04.412059 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:04.412093 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:04.412132 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:04.412168 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:04.412191 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:04.436740 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:04.439830 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:04.439928 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.000284 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:05.151665 39591 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0117 00:19:05.153094 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:05.153137 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:05.153225 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:05.154782 39591 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0117 00:19:05.159426 39591 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0117 00:19:05.159754 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.159918 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.160332 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.160410 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.160473 39591 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0117 00:19:05.160693 39591 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0117 00:19:05.160956 39591 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0117 00:19:05.165573 39591 target.go:111] Terraform output is in /tmp/test3724741124/out --- PASS: TestVFSServiceAccountIssuerDiscovery (0.76s) === RUN TestAWSLBController I0117 00:19:05.169692 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:05.169812 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:05.169847 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:05.169887 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:05.169918 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:05.169959 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:05.169995 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:05.170017 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:05.170047 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:05.170070 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:05.195994 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:05.198736 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.198808 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:05.761252 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:06.319234 39591 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0117 00:19:06.321308 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:06.321406 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:06.321564 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:06.328595 39591 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0117 00:19:06.333244 39591 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0117 00:19:06.333628 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.333839 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.334037 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.334448 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.334540 39591 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0117 00:19:06.334816 39591 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0117 00:19:06.335030 39591 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0117 00:19:06.341134 39591 target.go:111] Terraform output is in /tmp/test1270322201/out --- PASS: TestAWSLBController (1.18s) === RUN TestManyAddons I0117 00:19:06.348843 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:06.348958 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:06.348992 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:06.349035 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:06.349068 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:06.349106 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:06.349165 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:06.349187 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:06.349218 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:06.349241 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:06.376111 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:06.379485 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.379556 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:06.941341 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:07.616390 39591 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0117 00:19:07.618175 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:07.618208 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:07.618286 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:07.620754 39591 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0117 00:19:07.625152 39591 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0117 00:19:07.625544 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:07.625773 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:07.626183 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:07.626249 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:07.626353 39591 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0117 00:19:07.626573 39591 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0117 00:19:07.626857 39591 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0117 00:19:07.632562 39591 target.go:111] Terraform output is in /tmp/test2933204265/out --- PASS: TestManyAddons (1.30s) === RUN TestManyAddonsCCMIRSA I0117 00:19:07.646399 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:07.646522 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:07.646557 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:07.646601 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:07.646633 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:07.646676 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:07.646712 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:07.646735 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:07.646765 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:07.646790 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:07.670045 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:07.673047 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:07.673132 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:08.235600 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:08.952275 39591 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0117 00:19:08.953366 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:08.953399 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:08.953484 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:08.957871 39591 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0117 00:19:08.967693 39591 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0117 00:19:08.968128 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:08.968341 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:08.968688 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:08.969098 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:08.969216 39591 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0117 00:19:08.969468 39591 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0117 00:19:08.969715 39591 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0117 00:19:08.976231 39591 target.go:111] Terraform output is in /tmp/test1069975859/out --- PASS: TestManyAddonsCCMIRSA (1.34s) === RUN TestManyAddonsCCMIRSA23 I0117 00:19:08.984869 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:08.984983 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:08.985018 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:08.985056 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:08.985087 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:08.985153 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:08.985233 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:08.985255 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:08.985286 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:08.985309 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:09.007572 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0117 00:19:09.010580 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:09.010644 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:09.576233 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:10.294884 39591 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0117 00:19:10.295325 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:10.295369 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:10.295463 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:10.304224 39591 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0117 00:19:10.309185 39591 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0117 00:19:10.309727 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.310036 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.310421 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.310504 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.310700 39591 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0117 00:19:10.310940 39591 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0117 00:19:10.311174 39591 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0117 00:19:10.317847 39591 target.go:111] Terraform output is in /tmp/test1108870871/out --- PASS: TestManyAddonsCCMIRSA23 (1.34s) === RUN TestManyAddonsCCMIRSA24 I0117 00:19:10.326854 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:10.326971 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:10.327003 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:10.327045 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:10.327076 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:10.327134 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:10.327210 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:10.327234 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:10.327264 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:10.327288 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:10.354250 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:10.358052 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.358142 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:10.921753 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:11.615558 39591 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0117 00:19:11.623493 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:11.623590 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:11.623830 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:11.626807 39591 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0117 00:19:11.632003 39591 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0117 00:19:11.632310 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:11.632549 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:11.632776 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:11.633168 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:11.633261 39591 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0117 00:19:11.633475 39591 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0117 00:19:11.633761 39591 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0117 00:19:11.640499 39591 target.go:111] Terraform output is in /tmp/test2083165269/out --- PASS: TestManyAddonsCCMIRSA24 (1.32s) === RUN TestManyAddonsCCMIRSA25 I0117 00:19:11.650365 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:11.650521 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:11.650561 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:11.650622 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:11.650667 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:11.650735 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:11.650818 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:11.650864 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:11.650919 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:11.650956 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:11.677663 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:19:11.681583 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:11.681660 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:12.243946 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:12.971893 39591 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0117 00:19:12.979450 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:12.979493 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:12.979580 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:12.982620 39591 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0117 00:19:12.987227 39591 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0117 00:19:12.987749 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:12.987959 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:12.988359 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:12.988474 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:12.988587 39591 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0117 00:19:12.988821 39591 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0117 00:19:12.989139 39591 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0117 00:19:12.996319 39591 target.go:111] Terraform output is in /tmp/test531208141/out --- PASS: TestManyAddonsCCMIRSA25 (1.36s) === RUN TestManyAddonsCCMIRSA26 I0117 00:19:13.011484 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:13.011611 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:13.011645 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:13.011685 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:13.011718 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:13.011760 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:13.011835 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:13.011858 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:13.011888 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:13.011911 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:13.035609 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:19:13.038763 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:13.038830 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:13.597259 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:14.323130 39591 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0117 00:19:14.324066 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:14.324111 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:14.324220 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:14.326745 39591 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0117 00:19:14.331283 39591 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0117 00:19:14.331481 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:14.331837 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:14.332044 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:14.332401 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:14.332499 39591 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0117 00:19:14.332825 39591 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0117 00:19:14.333047 39591 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0117 00:19:14.339543 39591 target.go:111] Terraform output is in /tmp/test1271738772/out --- PASS: TestManyAddonsCCMIRSA26 (1.34s) === RUN TestManyAddonsGCE I0117 00:19:14.351820 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:15.693926 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:19:15.693980 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:19:15.694040 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0117 00:19:15.694053 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0117 00:19:15.694082 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0117 00:19:15.694134 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:19:15.694841 39591 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0117 00:19:15.705833 39591 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0117 00:19:15.710691 39591 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0117 00:19:15.711558 39591 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0117 00:19:15.711746 39591 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0117 00:19:15.715246 39591 target.go:111] Terraform output is in /tmp/test1097920224/out --- PASS: TestManyAddonsGCE (1.37s) === RUN TestCCM I0117 00:19:15.722341 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:15.722460 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:15.722496 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:15.722537 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:15.722569 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:15.722610 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:15.722647 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:15.722672 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:15.722703 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:15.722726 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:15.744917 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:15.747897 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:15.747971 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.309651 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:16.934410 39591 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0117 00:19:16.936739 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:16.936781 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:16.936923 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:16.939920 39591 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0117 00:19:16.944446 39591 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0117 00:19:16.944679 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.944844 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.945127 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.945403 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.945864 39591 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0117 00:19:16.946110 39591 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0117 00:19:16.946371 39591 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0117 00:19:16.951747 39591 target.go:111] Terraform output is in /tmp/test3422617409/out --- PASS: TestCCM (1.24s) === RUN TestExternalDNS I0117 00:19:16.959472 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:16.959583 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:16.959615 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:16.959653 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:16.959684 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:16.959726 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:16.959761 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:16.959785 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:16.959857 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:16.959882 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:16.985329 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:16.988029 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:16.988106 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.548921 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:17.703311 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:17.704508 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:17.704538 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:17.704616 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:17.707164 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:17.711656 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:17.712067 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.712300 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.712692 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.712764 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.712864 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:17.713180 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:17.713448 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:17.722718 39591 target.go:111] Terraform output is in /tmp/test4198238062/out --- PASS: TestExternalDNS (0.77s) === RUN TestExternalDNSIRSA I0117 00:19:17.727248 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:17.727438 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:17.727499 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:17.727566 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:17.727609 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:17.727690 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:17.727747 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:17.727769 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:17.727799 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:17.727822 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:17.748305 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:17.750894 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:17.750959 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.312571 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:18.491468 39591 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0117 00:19:18.493550 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:18.493583 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:18.493669 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:18.496249 39591 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0117 00:19:18.500686 39591 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0117 00:19:18.500867 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.501140 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.501486 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.501559 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.501623 39591 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0117 00:19:18.501820 39591 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0117 00:19:18.502157 39591 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0117 00:19:18.507483 39591 target.go:111] Terraform output is in /tmp/test1367246440/out --- PASS: TestExternalDNSIRSA (0.79s) === RUN TestKarpenter I0117 00:19:18.512336 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:18.512449 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:18.512482 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:18.512522 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:18.512555 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:18.512597 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:18.512636 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:18.512658 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:18.512689 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:18.512712 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:18.537656 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:18.540732 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.540789 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:18.540826 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.103789 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:19.256564 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.256666 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.256755 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0117 00:19:19.366313 39591 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0117 00:19:19.366369 39591 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0117 00:19:19.366383 39591 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0117 00:19:19.366391 39591 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0117 00:19:19.366397 39591 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0117 00:19:19.384639 39591 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0117 00:19:19.384881 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:19.384900 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:19.384968 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:19.393144 39591 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0117 00:19:19.397995 39591 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0117 00:19:19.398342 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.398472 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.398707 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.398923 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.399157 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.399240 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.399331 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.399612 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.399718 39591 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0117 00:19:19.399970 39591 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0117 00:19:19.400222 39591 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0117 00:19:19.406407 39591 target.go:111] Terraform output is in /tmp/test1976412241/out --- PASS: TestKarpenter (0.90s) === RUN TestSharedSubnet I0117 00:19:19.412269 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:19.412380 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:19.412411 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:19.412450 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:19.412483 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:19.412520 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:19.412553 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:19.412578 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:19.412610 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:19.412631 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:19.432269 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:19.434952 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.435040 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:19.997779 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:20.149554 39591 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0117 00:19:20.150088 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:20.150143 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:20.150230 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:20.158556 39591 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0117 00:19:20.158735 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:20.164055 39591 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0117 00:19:20.164316 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.164604 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.164725 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.165370 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.165467 39591 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0117 00:19:20.165738 39591 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0117 00:19:20.165995 39591 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0117 00:19:20.170319 39591 target.go:111] Terraform output is in /tmp/test3507533701/out --- PASS: TestSharedSubnet (0.76s) === RUN TestSharedVPC I0117 00:19:20.174287 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:20.174425 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:20.174466 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:20.174539 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:20.174589 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:20.174664 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:20.174712 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:20.174752 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:20.174808 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:20.174846 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:20.193868 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:20.196428 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.196507 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.757422 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:20.908621 39591 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0117 00:19:20.909164 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:20.909203 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:20.909288 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:20.911779 39591 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0117 00:19:20.912003 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:20.917235 39591 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0117 00:19:20.917903 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.918622 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.919368 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.921447 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.921613 39591 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0117 00:19:20.922025 39591 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0117 00:19:20.923204 39591 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0117 00:19:20.927775 39591 target.go:111] Terraform output is in /tmp/test2205863933/out --- PASS: TestSharedVPC (0.76s) === RUN TestSharedVPCIPv6 I0117 00:19:20.931631 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:20.931747 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:20.931781 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:20.931858 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:20.931891 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:20.931930 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:20.931969 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:20.931992 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:20.932023 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:20.932045 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:20.933716 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:19:20.933766 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:20.956372 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:19:20.956425 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:20.956509 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:20.959911 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:20.959983 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.520034 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:21.678519 39591 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0117 00:19:21.679800 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:21.679838 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:21.679918 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:21.681647 39591 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0117 00:19:21.682028 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:21.682213 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:21.684511 39591 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0117 00:19:21.685213 39591 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0117 00:19:21.685307 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:21.685378 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:21.685487 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:21.685551 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:21.689990 39591 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0117 00:19:21.690228 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.690436 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.690834 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.690907 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.690985 39591 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0117 00:19:21.691277 39591 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0117 00:19:21.691543 39591 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0117 00:19:21.696732 39591 target.go:111] Terraform output is in /tmp/test1450181740/out --- PASS: TestSharedVPCIPv6 (0.77s) === RUN TestExistingIAM I0117 00:19:21.700658 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:21.700768 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:21.700800 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:21.700837 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:21.700867 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:21.700910 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:21.700946 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:21.700969 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:21.700999 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:21.701022 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:21.733367 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:21.736480 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.736566 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.736614 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:21.736670 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.298238 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:22.449746 39591 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0117 00:19:22.452672 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:22.452722 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:22.452838 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:22.458616 39591 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0117 00:19:22.463699 39591 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0117 00:19:22.464040 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.464228 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.464449 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.464524 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.464705 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.464913 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.465060 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.465191 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.465312 39591 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0117 00:19:22.465583 39591 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0117 00:19:22.465879 39591 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0117 00:19:22.471939 39591 target.go:111] Terraform output is in /tmp/test2525664473/out --- PASS: TestExistingIAM (0.78s) === RUN TestPhaseNetwork I0117 00:19:22.476468 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:22.476581 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:22.476613 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:22.476653 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:22.476689 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:22.476729 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:22.476764 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:22.476788 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:22.476817 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:22.476840 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:22.499358 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:22.506203 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.507031 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:22.507073 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.072272 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:23.222448 39591 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0117 00:19:23.222979 39591 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0117 00:19:23.223542 39591 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0117 00:19:23.223899 39591 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0117 00:19:23.224055 39591 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0117 00:19:23.225435 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:23.225987 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:23.226439 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:19:23.229637 39591 target.go:111] Terraform output is in /tmp/test550375726/out --- PASS: TestPhaseNetwork (0.75s) === RUN TestExternalLoadBalancer I0117 00:19:23.230596 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:23.230746 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:23.230785 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:23.230829 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:23.230865 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:23.230905 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:23.230942 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:23.230963 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:23.230994 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:23.231016 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:23.251425 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:23.253986 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.254060 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.815735 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:23.957147 39591 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0117 00:19:23.958402 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:23.958444 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:23.958560 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:23.959642 39591 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0117 00:19:23.968235 39591 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0117 00:19:23.968529 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.969022 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.969286 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.969907 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:23.970006 39591 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0117 00:19:23.970287 39591 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0117 00:19:23.970524 39591 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0117 00:19:23.974970 39591 target.go:111] Terraform output is in /tmp/test3814636974/out --- PASS: TestExternalLoadBalancer (0.75s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0117 00:19:23.979497 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:23.979606 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:23.979639 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:23.979678 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:23.979711 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:23.979753 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:23.979789 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:23.979811 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:23.979843 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:23.979866 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:24.006151 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:24.009163 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009231 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009279 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009318 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009353 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009387 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.009425 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.574856 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:24.724445 39591 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0117 00:19:24.729761 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:24.729806 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:24.729979 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:24.733932 39591 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0117 00:19:24.739021 39591 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0117 00:19:24.739340 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.739572 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.739861 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740098 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740339 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740452 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740522 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740598 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.740681 39591 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0117 00:19:24.740988 39591 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0117 00:19:24.741322 39591 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0117 00:19:24.747976 39591 target.go:111] Terraform output is in /tmp/test1106210104/out --- PASS: TestMixedInstancesASG (0.77s) === RUN TestMixedInstancesSpotASG I0117 00:19:24.752800 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:24.752913 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:24.752947 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:24.752984 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:24.753018 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:24.753060 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:24.753095 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:24.753133 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:24.753167 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:24.753189 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:24.787429 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:24.790625 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790702 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790746 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790786 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790827 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790861 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:24.790893 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.350229 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:25.512491 39591 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0117 00:19:25.513010 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:25.513047 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:25.513157 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:25.515523 39591 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0117 00:19:25.520244 39591 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0117 00:19:25.520512 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.520625 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.520929 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521032 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521136 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521341 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521415 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521530 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.521630 39591 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0117 00:19:25.521877 39591 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0117 00:19:25.522260 39591 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0117 00:19:25.533938 39591 target.go:111] Terraform output is in /tmp/test611870744/out --- PASS: TestMixedInstancesSpotASG (0.79s) === RUN TestAdditionalObjects I0117 00:19:25.539538 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:25.539661 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:25.539694 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:25.539738 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:25.539773 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:25.539814 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:25.539851 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:25.539874 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:25.539905 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:25.539928 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:25.561293 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0117 00:19:25.564062 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:25.564155 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.128963 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:26.268452 39591 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0117 00:19:26.269784 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:26.269814 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:26.269897 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:26.271712 39591 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0117 00:19:26.277016 39591 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0117 00:19:26.277365 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.277623 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.277754 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.278361 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.278494 39591 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0117 00:19:26.278774 39591 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0117 00:19:26.279136 39591 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0117 00:19:26.283808 39591 target.go:111] Terraform output is in /tmp/test824019108/out --- PASS: TestAdditionalObjects (0.75s) === RUN TestContainerd I0117 00:19:26.291656 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:26.291798 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:26.291832 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:26.291873 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:26.291909 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:26.291949 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:26.291985 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:26.292007 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:26.292037 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:26.292059 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:26.312697 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:26.315366 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.315440 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:26.876568 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:27.019525 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:27.021862 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:27.021893 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:27.021978 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:27.023238 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:27.027601 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:27.027870 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.028101 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.028555 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.028639 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.028723 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:27.028945 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:27.029270 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:27.038584 39591 target.go:111] Terraform output is in /tmp/test2557586818/out --- PASS: TestContainerd (0.75s) === RUN TestContainerdCustom I0117 00:19:27.043328 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:27.043512 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:27.043552 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:27.043605 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:27.043646 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:27.043696 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:27.043740 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:27.043771 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:27.043805 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:27.043838 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:27.063892 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:27.066652 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.066742 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.550335 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:27.692881 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:27.694544 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:27.694578 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:27.694677 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:27.695796 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:27.700246 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:27.700706 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.700933 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.701313 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.701402 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.701494 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:27.701707 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:27.701973 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:27.706402 39591 target.go:111] Terraform output is in /tmp/test4147447110/out --- PASS: TestContainerdCustom (0.67s) === RUN TestDockerCustom I0117 00:19:27.710158 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:27.710267 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:27.710299 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:27.710336 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:27.710368 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:27.710405 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:27.710437 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:27.710459 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:27.710488 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:27.710509 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:27.736528 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0117 00:19:27.739477 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:27.739554 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.221909 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:28.360544 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:28.360796 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:28.360829 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:28.360907 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:28.363985 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:28.369143 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:28.369477 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.369693 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.369889 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.370284 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.370376 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:28.370643 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:28.370946 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:28.375349 39591 target.go:111] Terraform output is in /tmp/test235478878/out --- PASS: TestDockerCustom (0.67s) === RUN TestAPIServerNodes I0117 00:19:28.379216 39591 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0117 00:19:28.379238 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:28.379347 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:28.379381 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:28.379421 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:28.379454 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:28.379499 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:28.379534 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:28.379555 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:28.379587 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:28.379609 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:28.400773 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:19:28.403486 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.403557 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:28.403605 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.010798 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:29.155141 39591 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0117 00:19:29.157526 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:29.157551 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:29.157606 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:29.157883 39591 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0117 00:19:29.162184 39591 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0117 00:19:29.162469 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.162572 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.162699 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.162892 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.163072 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.163249 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.163369 39591 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0117 00:19:29.163683 39591 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0117 00:19:29.163956 39591 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0117 00:19:29.169019 39591 target.go:111] Terraform output is in /tmp/test2242115028/out I0117 00:19:29.173207 39591 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (0.79s) === RUN TestNTHIMDSProcessor I0117 00:19:29.173326 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:29.173434 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:29.173469 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:29.173508 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:29.173539 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:29.173588 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:29.173625 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:29.173648 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:29.173678 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:29.173700 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:29.193597 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:29.196252 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.196316 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.761375 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:29.899420 39591 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0117 00:19:29.899934 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:29.899964 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:29.900046 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:29.902668 39591 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0117 00:19:29.907053 39591 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0117 00:19:29.907390 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.907575 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.907758 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.908188 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.908278 39591 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0117 00:19:29.908486 39591 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0117 00:19:29.908694 39591 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0117 00:19:29.912546 39591 target.go:111] Terraform output is in /tmp/test1624008436/out --- PASS: TestNTHIMDSProcessor (0.74s) === RUN TestNTHIMDSProcessorIRSA I0117 00:19:29.915967 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:29.916079 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:29.916135 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:29.916178 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:29.916215 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:29.916257 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:29.916291 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:29.916315 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:29.916346 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:29.916369 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:29.936601 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:29.939230 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:29.939293 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.505852 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:30.676203 39591 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0117 00:19:30.676646 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:30.676703 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:30.676782 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:30.679782 39591 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0117 00:19:30.684452 39591 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0117 00:19:30.684785 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.684923 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.685195 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.685517 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.685607 39591 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0117 00:19:30.687021 39591 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0117 00:19:30.687967 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:30.695839 39591 target.go:111] Terraform output is in /tmp/test2706490815/out --- PASS: TestNTHIMDSProcessorIRSA (0.78s) === RUN TestCustomIRSA I0117 00:19:30.700632 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:30.700745 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:30.700778 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:30.700819 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:30.700853 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:30.700893 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:30.700930 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:30.700952 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:30.700982 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:30.701005 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:30.723660 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:30.726730 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:30.726798 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.286894 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:31.795651 39591 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0117 00:19:31.799936 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:31.799993 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:31.800139 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:31.804798 39591 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0117 00:19:31.809266 39591 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0117 00:19:31.809477 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.809736 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.810096 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.810190 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.810264 39591 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0117 00:19:31.810471 39591 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0117 00:19:31.810774 39591 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0117 00:19:31.816736 39591 target.go:111] Terraform output is in /tmp/test883889728/out --- PASS: TestCustomIRSA (1.12s) === RUN TestClusterNameDigit I0117 00:19:31.824771 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:31.824881 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:31.824915 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:31.824954 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:31.824986 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:31.825026 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:31.825059 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:31.825082 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:31.825133 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:31.825159 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:31.851715 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:31.854740 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:31.854816 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.419182 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:32.573765 39591 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0117 00:19:32.579427 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:32.579467 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:32.579690 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:32.583039 39591 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0117 00:19:32.588079 39591 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0117 00:19:32.588357 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.588536 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.588944 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.589059 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.589183 39591 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0117 00:19:32.589434 39591 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0117 00:19:32.589709 39591 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0117 00:19:32.594341 39591 target.go:111] Terraform output is in /tmp/test3298191362/out --- PASS: TestClusterNameDigit (0.77s) === RUN TestCASPriorityExpander I0117 00:19:32.598634 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:32.598747 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:32.598781 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:32.598821 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:32.598854 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:32.598897 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:32.598933 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:32.598956 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:32.598993 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:32.599016 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:32.623069 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:19:32.626054 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.626139 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.626188 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:32.626228 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:19:33.562518 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:33.729370 39591 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0117 00:19:33.731509 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:33.731539 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:33.731613 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:33.733013 39591 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0117 00:19:33.737588 39591 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0117 00:19:33.737917 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738071 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738269 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738449 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738514 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738581 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.738838 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.739089 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.739203 39591 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0117 00:19:33.739503 39591 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0117 00:19:33.739777 39591 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0117 00:19:33.743959 39591 target.go:111] Terraform output is in /tmp/test3028383179/out --- PASS: TestCASPriorityExpander (1.15s) === RUN TestCASPriorityExpanderCustom I0117 00:19:33.747131 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:33.747217 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:33.747243 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:33.747272 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:33.747294 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:33.747323 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:33.747349 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:33.747365 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:33.747388 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:33.747406 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:19:33.770795 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0117 00:19:33.773767 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.773865 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.773908 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:33.773947 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:19:34.340444 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:34.511087 39591 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0117 00:19:34.514031 39591 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0117 00:19:34.514053 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:34.514111 39591 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0117 00:19:34.514306 39591 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0117 00:19:34.523703 39591 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0117 00:19:34.524229 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.524643 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.524890 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525108 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525319 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525404 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525506 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525585 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.525671 39591 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0117 00:19:34.526019 39591 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0117 00:19:34.526323 39591 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0117 00:19:34.532070 39591 target.go:111] Terraform output is in /tmp/test759605466/out --- PASS: TestCASPriorityExpanderCustom (0.79s) === RUN TestLifecycleMinimalAWS I0117 00:19:34.536666 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:34.536782 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:34.536818 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:34.536856 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:34.536891 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:34.536935 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:34.536976 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:34.536999 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:34.537029 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:34.537053 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0117 00:19:34.556255 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:19:34.558788 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:34.558856 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:19:35.166042 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:35.310334 39591 iamrole.go:89] ListRoles: { } I0117 00:19:35.311453 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:35.311918 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.312083 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0117 00:19:35.312230 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] } I0117 00:19:35.312217 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:35.312444 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:35.313505 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0117 00:19:35.313605 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0117 00:19:35.313609 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.313788 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:35.313779 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.313868 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:35.314030 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.314194 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.314272 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:35.314323 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:35.314349 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:35.314382 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:35.314410 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.314532 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:35.314636 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:35.314863 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:35.315018 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.315832 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:35.315970 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:19:35.315958 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:35.316067 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:19:35.316052 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.316176 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:35.316235 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0117 00:19:35.316299 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:19:35.316423 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:19:35.316468 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:19:35.316423 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:35.316627 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:35.316693 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.316847 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.316927 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:35.316973 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:35.317085 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0117 00:19:35.317142 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:35.317392 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0117 00:19:35.317415 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:35.317564 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:35.317649 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:35.317688 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:35.317741 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:35.317780 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:35.317834 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:35.317894 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0117 00:19:35.317969 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] }], VpcId: "vpc-1" } I0117 00:19:35.318039 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:35.318086 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:35.318273 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:19:35.321353 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:35.321541 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:35.321661 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:35.321751 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:35.321918 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" }] }] } I0117 00:19:35.322143 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" }] }] } I0117 00:19:35.322316 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.322447 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.322605 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0117 00:19:35.322724 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:35.322803 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:35.322852 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.323028 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:19:35.323179 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:19:35.323309 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.323427 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.323545 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" }] }] } I0117 00:19:35.323669 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:35.323720 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0117 00:19:35.323759 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:19:35.323893 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.324018 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:35.324132 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:35.324220 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:35.324359 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:35.324445 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:19:35.325002 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:35.325294 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:35.325553 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:35.325591 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:35.325617 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:35.325677 39591 dns.go:235] Pre-creating DNS records I0117 00:19:35.325703 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:35.331801 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0117 00:19:35.337191 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:35.337273 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0117 00:19:35.945805 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:36.088428 39591 iamrole.go:89] ListRoles: { } I0117 00:19:36.089242 39591 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0117 00:19:36.089538 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.089803 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.089922 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:36.089953 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:36.089995 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:36.090229 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:36.090322 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.090626 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] }] } I0117 00:19:36.090877 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:36.092211 39591 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0117 00:19:36.092341 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.092467 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:36.092536 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:19:36.092552 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:36.092588 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.092661 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:19:36.092695 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.092796 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:36.092860 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0117 00:19:36.092993 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:36.093052 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0117 00:19:36.093214 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:36.096871 39591 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0117 00:19:36.097083 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:36.097209 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:36.097329 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:36.097430 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:36.097536 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:36.097725 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:36.097881 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:36.098466 39591 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0117 00:19:36.098631 39591 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0117 00:19:36.098808 39591 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0117 00:19:36.100829 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:36.100879 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:36.100907 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:36.100931 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:36.100952 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:36.100974 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:36.100997 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:36.101021 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:19:36.101047 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:36.101076 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:36.101102 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:36.101162 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:36.101189 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:36.101211 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:36.101231 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:36.101253 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:36.101278 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:36.101302 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:36.101323 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:36.101343 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:36.101362 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:36.101385 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:36.101410 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:36.101432 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:36.102379 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:36.102459 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:36.102476 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:36.102517 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102557 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0117 00:19:36.102601 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102647 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102682 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102723 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102754 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102782 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0117 00:19:36.102817 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102855 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:19:36.102885 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0117 00:19:36.102920 39591 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0117 00:19:36.102945 39591 api.go:53] PageSize not implemented I0117 00:19:36.102967 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:36.102989 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:36.103004 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:36.103044 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:36.103059 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:19:36.103103 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:36.103157 39591 iamrole.go:89] ListRoles: { } I0117 00:19:36.103194 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:36.103214 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:36.103246 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:36.103281 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:36.103307 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-1 ok I0117 00:19:36.103711 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.minimal.example.com ok I0117 00:19:36.103786 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:19:36.103888 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0117 00:19:36.103699 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:36.103927 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0117 00:19:36.103963 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0117 00:19:36.103785 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0117 00:19:36.104086 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:36.104109 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:19:36.104177 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:19:36.104233 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:19:36.104272 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0117 00:19:36.104342 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:36.104410 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0117 00:19:36.104529 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:36.104550 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:36.104582 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0117 00:19:36.104658 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:19:36.104778 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:36.104796 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0117 00:19:36.104903 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:19:36.104923 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:19:36.104957 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0117 00:19:36.105005 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0117 00:19:36.105073 39591 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:19:36.105086 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:19:36.105110 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0117 00:19:36.105203 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:19:36.105277 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:19:36.105339 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (1.57s) === RUN TestLifecycleMinimalOpenstack I0117 00:19:36.105754 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0117 00:19:36.112930 39591 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:36.801078 39591 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0117 00:19:36.801104 39591 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0117 00:19:36.817090 39591 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2026/01/17 00:19:36 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:36 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0117 00:19:36.821106 39591 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0117 00:19:36.844472 39591 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0117 00:19:36.847899 39591 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2026/01/17 00:19:36 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:36 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:36 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0117 00:19:36.850287 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:36.850450 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:36.850464 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0117 00:19:37.855276 39591 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:38.528621 39591 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0117 00:19:38.528649 39591 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0117 00:19:38.545314 39591 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0117 00:19:38.550739 39591 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0117 00:19:38.556375 39591 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0117 00:19:38.557770 39591 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0117 00:19:38.560168 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:38.560594 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:38.560826 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0117 00:19:38.561140 39591 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0117 00:19:38.562359 39591 delete_cluster.go:128] Looking for cloud resources to delete 2026/01/17 00:19:38 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) SecurityGroup:c6f4d107-af4a-446e-9a4c-b664874d7b1f ok SecurityGroup:2f83acca-5455-42aa-809f-f5722a723b47 ok ServerGroup:b3c65a14-99ee-44b1-855a-5085c0b2e99f ok Port:12407da3-3c50-4c9d-8a0b-a92b5000084f ok Instance:3f728d38-60b7-4ab5-bb84-eb62a30cb3be ok ServerGroup:b30d863c-df45-432c-8f77-6cd3867c8833 ok SecurityGroup:669cf1b3-22a2-4fa9-b877-af6e7aa91342 ok Port:4f08caaa-26e4-47c0-858d-ad6811b169cb ok Instance:3a0788ed-7fbd-4c38-ab9b-968c22d321c9 ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Subnet:89ba9a2b-e841-4952-9a2b-c4548b8334ce ok Network:0d127949-7dc0-45ba-92b5-49832065148f ok Instance:04f128a8-add9-419c-9d5d-4a952e2c7540 ok Port:d726959f-9ab7-4693-9265-82dbce203fcd ok --- PASS: TestLifecycleMinimalOpenstack (3.56s) === RUN TestLifecycleMinimalGCE I0117 00:19:39.666630 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0117 00:19:39.668078 39591 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:40.624900 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:19:40.624987 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:19:40.625088 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0117 00:19:40.625110 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0117 00:19:40.625147 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0117 00:19:40.625202 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:19:40.626370 39591 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0117 00:19:40.629577 39591 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0117 00:19:40.633974 39591 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0117 00:19:40.634811 39591 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0117 00:19:40.634972 39591 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0117 00:19:40.635047 39591 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:41.616915 39591 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0117 00:19:41.616994 39591 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0117 00:19:41.617140 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0117 00:19:41.617165 39591 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0117 00:19:41.617182 39591 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0117 00:19:41.617234 39591 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0117 00:19:41.618618 39591 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0117 00:19:41.622518 39591 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0117 00:19:41.627093 39591 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0117 00:19:41.627920 39591 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0117 00:19:41.628069 39591 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0117 00:19:41.629468 39591 delete_cluster.go:128] Looking for cloud resources to delete I0117 00:19:41.629553 39591 gce.go:99] Scanning zones: [us-test1-a] I0117 00:19:41.629853 39591 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0117 00:19:41.629876 39591 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:ssh-external-to-master-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok FirewallRule:node-to-master-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:node-to-node-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1768609180 ok InstanceTemplate:nodes-minimal-gce-example-com-1768609180 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (1.96s) === RUN TestLifecycleFloatingIPOpenstack I0117 00:19:41.631167 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0117 00:19:41.638358 39591 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:42.330287 39591 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0117 00:19:42.330315 39591 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0117 00:19:42.344052 39591 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2026/01/17 00:19:42 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:42 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0117 00:19:42.349815 39591 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0117 00:19:42.360691 39591 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0117 00:19:42.365760 39591 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2026/01/17 00:19:42 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:42 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:42 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0117 00:19:42.368592 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:42.368623 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:42.368693 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0117 00:19:43.372762 39591 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0117 00:19:44.043580 39591 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0117 00:19:44.043606 39591 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0117 00:19:44.059970 39591 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0117 00:19:44.064742 39591 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0117 00:19:44.070822 39591 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0117 00:19:44.072527 39591 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0117 00:19:44.075313 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0117 00:19:44.075425 39591 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0117 00:19:44.075704 39591 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0117 00:19:44.077016 39591 delete_cluster.go:128] Looking for cloud resources to delete 2026/01/17 00:19:44 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:2682c33e-3d3c-45c0-9884-1a88c83c3694 ok Port:d6e99da2-bad7-45ba-ab90-00de9443a922 ok Subnet:2682c33e-3d3c-45c0-9884-1a88c83c3694 ok SecurityGroup:db95090f-1e07-4099-a7f9-3f7603ffbc46 ok Port:e65d6d41-1f75-4eb4-aa9d-8ee87b436ee5 ok SecurityGroup:93a4a853-dcd4-46b8-8489-bff636287ff7 ok Instance:b9d13acc-c658-4eb5-9c20-f60bf0826b9b ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Network:035a59c5-cbfa-459b-96df-9790de3a5aca ok Router:35a7d277-e42d-4776-971e-0427dffebcb1 ok SecurityGroup:626618cf-1a81-4451-9a67-2f9d1aa617c9 ok Port:e0c7d15c-1ebd-4aba-ad57-7b4e947b1da9 ok Instance:1db2ff0d-3f29-41f3-ad7b-46c803676c7e ok Port:dc960bb7-1287-4f71-b7f5-2de2d6471bb4 ok ServerGroup:907c6fec-9b4f-4c85-846b-20e42f1b3159 ok ServerGroup:4a968836-0701-464c-aa5f-3258d590cf0f ok Instance:612722d1-4283-4894-9832-e7e074dce28e ok --- PASS: TestLifecycleFloatingIPOpenstack (3.55s) === RUN TestLifecyclePrivateCalico I0117 00:19:45.182916 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:45.183048 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:45.183084 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:45.183151 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:45.183189 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:45.183229 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:45.183265 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:45.183287 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:45.183316 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:45.183339 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0117 00:19:45.206262 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:45.209384 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:45.209456 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:45.209502 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:45.769995 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:46.127039 39591 iamrole.go:89] ListRoles: { } I0117 00:19:46.128601 39591 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0117 00:19:46.129130 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:46.129259 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0117 00:19:46.129373 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.129565 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:46.129641 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0117 00:19:46.129739 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0117 00:19:46.129689 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:46.130941 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:46.131172 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.131251 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0117 00:19:46.131341 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0117 00:19:46.131380 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" }] }] } I0117 00:19:46.131522 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:46.131591 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.131648 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0117 00:19:46.131705 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0117 00:19:46.131768 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:46.131892 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:46.132108 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.132277 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.132351 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:46.132381 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:46.132404 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:46.132437 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:46.133142 39591 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0117 00:19:46.133285 39591 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0117 00:19:46.133287 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0117 00:19:46.133310 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0117 00:19:46.133376 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0117 00:19:46.133476 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0117 00:19:46.133429 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.133442 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0117 00:19:46.133546 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0117 00:19:46.133586 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.133583 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0117 00:19:46.133644 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0117 00:19:46.133669 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:46.133694 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0117 00:19:46.133712 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.133724 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0117 00:19:46.133804 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0117 00:19:46.133862 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:46.133880 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.133986 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:46.134075 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:46.134082 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:46.134219 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:46.134279 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0117 00:19:46.134435 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:46.134509 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:46.134547 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:46.134579 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.134714 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:46.134738 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0117 00:19:46.134916 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:46.134990 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:46.135057 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:46.135133 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0117 00:19:46.135228 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:46.135329 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:46.135387 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" } ] } I0117 00:19:46.135452 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:46.135488 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:46.135265 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0117 00:19:46.135522 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:46.135590 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:46.135631 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:46.135660 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:46.135737 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:19:46.135777 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:19:46.135806 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0117 00:19:46.135938 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:46.135990 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:46.136024 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:46.135916 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0117 00:19:46.136059 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:46.136104 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:46.136168 39591 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" } ] } I0117 00:19:46.136290 39591 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0117 00:19:46.136449 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.136525 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:46.136591 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:46.136592 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } W0117 00:19:46.136576 39591 api.go:53] PageSize not implemented I0117 00:19:46.136685 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }], Type: "network" } I0117 00:19:46.136698 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.136856 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0117 00:19:46.136862 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:46.136941 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.136988 39591 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0117 00:19:46.137055 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:46.137082 39591 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0117 00:19:46.137054 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.137173 39591 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0117 00:19:46.137262 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.137404 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" }] }] } I0117 00:19:46.137519 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0117 00:19:46.137644 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:46.137724 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:46.137809 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:46.137892 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.138003 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:46.138058 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:46.138032 39591 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.138132 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:46.138206 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:46.138235 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:46.138281 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } I0117 00:19:46.138277 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } W0117 00:19:46.138384 39591 api.go:53] PageSize not implemented I0117 00:19:46.138413 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.138500 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:46.138530 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0117 00:19:46.138608 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.138713 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0117 00:19:46.138814 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.138915 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139016 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:46.139093 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139207 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139305 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" }] }] } I0117 00:19:46.139411 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139505 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" }] }] } I0117 00:19:46.139606 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139707 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0117 00:19:46.139781 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:46.139839 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.139937 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0117 00:19:46.139973 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0117 00:19:46.140002 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0117 00:19:46.140105 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:46.140150 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0117 00:19:46.140177 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.140283 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.140383 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.140526 39591 executor.go:111] Tasks: 120 done / 142 total; 6 can run I0117 00:19:46.140613 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0117 00:19:46.140649 39591 api.go:53] PageSize not implemented I0117 00:19:46.140701 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:46.140708 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:46.140699 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:46.140803 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:46.140795 39591 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } W0117 00:19:46.140845 39591 api.go:53] PageSize not implemented I0117 00:19:46.140868 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:46.140895 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:46.140910 39591 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0117 00:19:46.141003 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:19:46.141038 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:46.141070 39591 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0117 00:19:46.144926 39591 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0117 00:19:46.145102 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:46.145252 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0117 00:19:46.145363 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.145450 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.145586 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.145679 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.146108 39591 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0117 00:19:46.146324 39591 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0117 00:19:46.146555 39591 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0117 00:19:46.146605 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:46.146636 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:46.146698 39591 dns.go:235] Pre-creating DNS records I0117 00:19:46.146721 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:46.151834 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:46.154786 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.154855 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.154899 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:46.718009 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:47.067676 39591 iamrole.go:89] ListRoles: { } I0117 00:19:47.069191 39591 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0117 00:19:47.069556 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.069766 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:47.070189 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.070409 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.070598 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.070708 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:47.070732 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:47.070771 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.070811 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:47.071843 39591 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0117 00:19:47.071973 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.072092 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.072207 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0117 00:19:47.072266 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:47.072284 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0117 00:19:47.072359 39591 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0117 00:19:47.072321 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0117 00:19:47.072321 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.072400 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0117 00:19:47.072440 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0117 00:19:47.072464 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0117 00:19:47.072598 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:47.072641 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0117 00:19:47.072751 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:47.072794 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.072871 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0117 00:19:47.072992 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:19:47.073044 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0117 00:19:47.073230 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:47.073297 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.073459 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:47.073497 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.073601 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.073716 39591 executor.go:111] Tasks: 79 done / 142 total; 41 can run W0117 00:19:47.073890 39591 api.go:53] PageSize not implemented I0117 00:19:47.073922 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.073944 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.074012 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.074047 39591 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0117 00:19:47.074078 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:47.074150 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:47.074220 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:47.074235 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0117 00:19:47.074272 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0117 00:19:47.074208 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.074298 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0117 00:19:47.074334 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0117 00:19:47.074363 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } W0117 00:19:47.074433 39591 api.go:53] PageSize not implemented I0117 00:19:47.074370 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.074481 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.074448 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.074591 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:47.074639 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0117 00:19:47.074671 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0117 00:19:47.074727 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:47.074869 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:47.075174 39591 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0117 00:19:47.075251 39591 api.go:53] PageSize not implemented I0117 00:19:47.075300 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.075247 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:47.075368 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:47.075380 39591 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0117 00:19:47.075300 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.075402 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:47.075433 39591 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0117 00:19:47.075457 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } W0117 00:19:47.075551 39591 api.go:53] PageSize not implemented I0117 00:19:47.075581 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.075669 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.079716 39591 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0117 00:19:47.079811 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.079897 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.080021 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.080088 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.080239 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.080804 39591 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0117 00:19:47.080925 39591 api.go:53] PageSize not implemented I0117 00:19:47.080953 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.081149 39591 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0117 00:19:47.081328 39591 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0117 00:19:47.083988 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:47.084039 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:47.084069 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:47.084096 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0117 00:19:47.084136 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:47.084160 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:47.084187 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:47.084209 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:47.084236 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:19:47.084260 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:47.084286 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:47.084318 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0117 00:19:47.084344 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:19:47.084368 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:47.084391 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:47.084412 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:47.084441 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:47.084464 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:47.084487 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:47.084511 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:47.084537 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:47.084563 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:19:47.084586 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:47.084609 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:47.084632 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:47.084659 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:47.084680 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:47.084705 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:47.084730 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:47.084759 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:47.084784 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:47.085997 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:47.086056 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:47.086073 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:47.086106 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086168 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0117 00:19:47.086217 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086264 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086299 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086335 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086367 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086399 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0117 00:19:47.086441 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086483 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:47.086506 39591 natgateway.go:117] DescribeNatGateways: { } I0117 00:19:47.086540 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0117 00:19:47.086570 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0117 00:19:47.086609 39591 api.go:53] PageSize not implemented I0117 00:19:47.086623 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0117 00:19:47.086704 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:47.086728 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:47.086740 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0117 00:19:47.086770 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:47.086789 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:47.086802 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" ] } I0117 00:19:47.086849 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:47.086884 39591 iamrole.go:89] ListRoles: { } I0117 00:19:47.086920 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:47.086941 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:47.086979 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:47.087017 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:47.087049 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0117 00:19:47.087081 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:47.087109 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0117 00:19:47.087626 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok I0117 00:19:47.087720 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok I0117 00:19:47.087755 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } autoscaling-group:nodes.privatecalico.example.com ok autoscaling-group:bastion.privatecalico.example.com ok I0117 00:19:47.087820 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0117 00:19:47.087680 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0117 00:19:47.087879 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:47.087864 39591 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } load-balancer:api-privatecalico-example-0uch4k ok I0117 00:19:47.087896 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0117 00:19:47.087850 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0117 00:19:47.087922 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:19:47.087923 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0117 00:19:47.087973 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0117 00:19:47.087976 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0117 00:19:47.088009 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0117 00:19:47.088051 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:19:47.088082 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0117 00:19:47.088100 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:19:47.088174 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:47.088019 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.privatecalico.example.com. ok I0117 00:19:47.088228 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 } ] } W0117 00:19:47.088382 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:47.088400 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:47.088433 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-3 ok I0117 00:19:47.088518 39591 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0117 00:19:47.088567 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:47.088610 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0117 00:19:47.088718 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:47.088734 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:19:47.088824 39591 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0117 00:19:47.088842 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0117 00:19:47.088875 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:47.088889 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0117 00:19:47.088946 39591 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0117 00:19:47.088939 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0117 00:19:47.088959 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0117 00:19:47.088984 39591 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0117 00:19:47.088977 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:47.089010 39591 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0117 00:19:47.089027 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0117 00:19:47.089052 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } iam-role:masters.privatecalico.example.com ok I0117 00:19:47.089084 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0117 00:19:47.089136 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0117 00:19:47.089018 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 } ] } I0117 00:19:47.089148 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } W0117 00:19:47.089161 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:47.089168 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } iam-role:nodes.privatecalico.example.com ok I0117 00:19:47.089174 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0117 00:19:47.089243 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0117 00:19:47.089293 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:19:47.089351 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:19:47.089410 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (1.91s) === RUN TestLifecyclePrivateKopeio I0117 00:19:47.089830 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:47.089953 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:47.089984 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:47.090017 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:47.090045 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:47.090084 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:47.090150 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:47.090175 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:47.090207 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:47.090231 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0117 00:19:47.112461 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:47.115352 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.115417 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.115458 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.681847 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:47.835927 39591 iamrole.go:89] ListRoles: { } I0117 00:19:47.837659 39591 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0117 00:19:47.837846 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.838003 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:47.838136 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:47.838091 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0117 00:19:47.838183 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.838213 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0117 00:19:47.838326 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.838364 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0117 00:19:47.838438 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:47.838483 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:47.838524 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:47.838461 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0117 00:19:47.838581 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.838606 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0117 00:19:47.838655 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" }] } I0117 00:19:47.838775 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:47.839103 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.839264 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.839359 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:47.839406 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.839547 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:47.839665 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:47.839705 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:47.839823 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.841037 39591 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0117 00:19:47.841225 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0117 00:19:47.841263 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0117 00:19:47.841438 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.841420 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0117 00:19:47.841549 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0117 00:19:47.841274 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0117 00:19:47.841591 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0117 00:19:47.841658 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0117 00:19:47.841622 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.841856 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0117 00:19:47.841918 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0117 00:19:47.841948 39591 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0117 00:19:47.841963 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.842028 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0117 00:19:47.841907 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0117 00:19:47.842109 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:47.842211 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:47.842263 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0117 00:19:47.842263 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:47.842307 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0117 00:19:47.842501 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0117 00:19:47.842603 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0117 00:19:47.842561 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.842815 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.842818 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-1" } I0117 00:19:47.842968 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:47.842976 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0117 00:19:47.843034 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.843182 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] }] } I0117 00:19:47.843317 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0117 00:19:47.843387 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:47.843438 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0117 00:19:47.843590 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:47.843698 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0117 00:19:47.843834 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] }] } I0117 00:19:47.843958 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:47.844074 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:47.844205 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:47.844269 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:47.844340 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:47.844417 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:47.844397 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0117 00:19:47.844499 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0117 00:19:47.844227 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0117 00:19:47.844560 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:47.844679 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:47.844731 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:47.844764 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:47.844852 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:19:47.844894 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:19:47.844929 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0117 00:19:47.845080 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:47.845049 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0117 00:19:47.845170 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0117 00:19:47.845220 39591 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" } ] } I0117 00:19:47.845277 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0117 00:19:47.845334 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:47.845374 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:47.845407 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:47.845439 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:47.845465 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:47.845495 39591 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0117 00:19:47.845554 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0117 00:19:47.845589 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:47.845636 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.845689 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:47.845769 39591 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0117 00:19:47.845910 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:47.845904 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:47.846162 39591 api.go:53] PageSize not implemented W0117 00:19:47.846177 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:47.846071 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.846229 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0117 00:19:47.846275 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:47.846284 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-4" },{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0117 00:19:47.846355 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:47.846357 39591 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] } I0117 00:19:47.846406 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:47.846439 39591 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0117 00:19:47.846402 39591 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0117 00:19:47.846565 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:47.846492 39591 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0117 00:19:47.846616 39591 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0117 00:19:47.846665 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0117 00:19:47.846703 39591 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0117 00:19:47.846826 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.847043 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.847220 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.847318 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:47.847425 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.847583 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0117 00:19:47.847640 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0117 00:19:47.847763 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.847934 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.848021 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" }] }] } I0117 00:19:47.848208 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.848354 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.848480 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:47.848581 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0117 00:19:47.848667 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0117 00:19:47.848714 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:47.848780 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" }] }] } I0117 00:19:47.848918 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.849060 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:47.849138 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.849238 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.849379 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.849511 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0117 00:19:47.849566 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.849694 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:47.849794 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0117 00:19:47.849849 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0117 00:19:47.849956 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.850088 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.850239 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.850371 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.850505 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0117 00:19:47.850607 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0117 00:19:47.850662 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.850785 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.850910 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:47.851009 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0117 00:19:47.851153 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:47.851213 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:47.851307 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } I0117 00:19:47.851265 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } W0117 00:19:47.851427 39591 api.go:53] PageSize not implemented I0117 00:19:47.851436 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:47.851454 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:47.851491 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0117 00:19:47.851659 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0117 00:19:47.851715 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.851775 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0117 00:19:47.851820 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-4" } I0117 00:19:47.851863 39591 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0117 00:19:47.851924 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0117 00:19:47.851965 39591 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0117 00:19:47.852009 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:47.852063 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0117 00:19:47.852198 39591 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0117 00:19:47.852269 39591 api.go:53] PageSize not implemented I0117 00:19:47.852290 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:47.852314 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:47.852320 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:47.852366 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0117 00:19:47.852492 39591 api.go:53] PageSize not implemented I0117 00:19:47.852482 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-1" } I0117 00:19:47.852537 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:47.852549 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:47.852557 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:47.852675 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0117 00:19:47.852689 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:47.857007 39591 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0117 00:19:47.857191 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.857291 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.857371 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.857489 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.858048 39591 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0117 00:19:47.858362 39591 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0117 00:19:47.858578 39591 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0117 00:19:47.858612 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:47.858641 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:47.858700 39591 dns.go:235] Pre-creating DNS records I0117 00:19:47.858722 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:47.863864 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:47.866760 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.866826 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:47.866871 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.433730 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:48.583485 39591 iamrole.go:89] ListRoles: { } I0117 00:19:48.585126 39591 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0117 00:19:48.585716 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:48.585863 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.585955 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:48.585981 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:48.585947 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:48.586020 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:48.586195 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.586360 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.586470 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.588297 39591 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0117 00:19:48.588519 39591 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0117 00:19:48.588436 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.588648 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0117 00:19:48.588596 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.588754 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.588833 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0117 00:19:48.588898 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:48.588904 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0117 00:19:48.588935 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0117 00:19:48.588943 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0117 00:19:48.588937 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0117 00:19:48.589070 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:19:48.589129 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:48.589168 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.589281 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.589369 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0117 00:19:48.589475 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:48.589513 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.589618 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:48.589649 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:48.589719 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.589814 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0117 00:19:48.589841 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0117 00:19:48.589956 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:48.589995 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:48.590079 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.590207 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0117 00:19:48.590323 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:48.590449 39591 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0117 00:19:48.590618 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } W0117 00:19:48.590704 39591 api.go:53] PageSize not implemented I0117 00:19:48.590720 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0117 00:19:48.590725 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.590795 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.590827 39591 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0117 00:19:48.590811 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:48.590787 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:48.590909 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:48.590937 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0117 00:19:48.590977 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:48.591031 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0117 00:19:48.591083 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0117 00:19:48.591148 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0117 00:19:48.591202 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } W0117 00:19:48.591299 39591 api.go:53] PageSize not implemented I0117 00:19:48.591325 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.591277 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.591411 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.591705 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:48.591791 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:48.591852 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:48.591913 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:48.592025 39591 executor.go:111] Tasks: 122 done / 144 total; 7 can run I0117 00:19:48.592093 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:48.592145 39591 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0117 00:19:48.592104 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:48.592166 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.592203 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:48.592246 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:48.592297 39591 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" W0117 00:19:48.592242 39591 api.go:53] PageSize not implemented I0117 00:19:48.592358 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } W0117 00:19:48.592519 39591 api.go:53] PageSize not implemented I0117 00:19:48.592571 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.592778 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.596662 39591 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0117 00:19:48.596806 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.596942 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.597016 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.597164 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.597528 39591 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0117 00:19:48.597609 39591 api.go:53] PageSize not implemented I0117 00:19:48.597625 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.597776 39591 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0117 00:19:48.597915 39591 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0117 00:19:48.600499 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:48.600548 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:48.600578 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:48.600603 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:48.600625 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:48.600654 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:48.600676 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:48.600702 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:19:48.600728 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:48.600752 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:48.600784 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0117 00:19:48.600810 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:48.600836 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:48.600862 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:48.600888 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:48.600911 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:48.600935 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0117 00:19:48.600963 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:48.600988 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:48.601013 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:48.601035 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:19:48.601060 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:48.601086 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:48.601107 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:48.601152 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:48.601178 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0117 00:19:48.601204 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:48.601228 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:48.601249 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:48.601275 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:48.601303 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:48.601327 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:48.602570 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:48.602627 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:48.602644 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:48.602679 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602725 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0117 00:19:48.602773 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602818 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602851 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602890 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602922 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.602960 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0117 00:19:48.603011 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.603064 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:48.603088 39591 natgateway.go:117] DescribeNatGateways: { } I0117 00:19:48.603132 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0117 00:19:48.603166 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0117 00:19:48.603206 39591 api.go:53] PageSize not implemented I0117 00:19:48.603219 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0117 00:19:48.603247 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:48.603267 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:48.603278 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0117 00:19:48.603309 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:48.603327 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:48.603340 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" ] } I0117 00:19:48.603387 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:48.603423 39591 iamrole.go:89] ListRoles: { } I0117 00:19:48.603466 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:48.603485 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:48.603518 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:48.603554 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:48.603594 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0117 00:19:48.603629 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0117 00:19:48.603653 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } autoscaling-config:lt-3 ok autoscaling-group:nodes.privatekopeio.example.com ok I0117 00:19:48.604228 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:19:48.604264 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0117 00:19:48.604297 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:19:48.604216 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok I0117 00:19:48.604351 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0117 00:19:48.604434 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0117 00:19:48.604378 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0117 00:19:48.604463 39591 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } load-balancer:api-privatekopeio-example-tl2bv8 ok W0117 00:19:48.604496 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:48.604533 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0117 00:19:48.604570 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:19:48.604565 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0117 00:19:48.604620 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:19:48.604631 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok I0117 00:19:48.604656 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok autoscaling-group:bastion.privatekopeio.example.com ok I0117 00:19:48.604702 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok I0117 00:19:48.604743 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.privatekopeio.example.com. ok I0117 00:19:48.604793 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0117 00:19:48.604760 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } volume:vol-1 ok iam-instance-profile:nodes.privatekopeio.example.com ok I0117 00:19:48.604652 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0117 00:19:48.604830 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0117 00:19:48.604980 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:48.605002 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0117 00:19:48.605041 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:48.605080 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0117 00:19:48.605252 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:48.605263 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:48.605350 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0117 00:19:48.605388 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0117 00:19:48.605364 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0117 00:19:48.605400 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0117 00:19:48.605490 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0117 00:19:48.605434 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:48.605540 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0117 00:19:48.605592 39591 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0117 00:19:48.605604 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0117 00:19:48.605628 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0117 00:19:48.605558 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:48.605650 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } W0117 00:19:48.605675 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:48.605681 39591 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0117 00:19:48.605690 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0117 00:19:48.605696 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0117 00:19:48.605717 39591 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0117 00:19:48.605731 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0117 00:19:48.605803 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:48.605850 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0117 00:19:48.605941 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0117 00:19:48.605987 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:19:48.606032 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0117 00:19:48.606092 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:19:48.606177 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (1.52s) === RUN TestLifecycleIPv6 I0117 00:19:48.606592 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:48.606717 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:48.606748 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:48.606783 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:48.606814 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:48.606853 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:48.606888 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:48.606910 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:48.606943 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:48.606969 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0117 00:19:48.630009 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:48.632990 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:48.633054 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.199094 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:49.347687 39591 iamrole.go:89] ListRoles: { } I0117 00:19:49.349181 39591 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0117 00:19:49.349502 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.349642 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.349839 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:49.349818 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:49.349968 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:49.349975 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0117 00:19:49.350023 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.350072 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0117 00:19:49.350175 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.350256 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:49.350475 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:49.350550 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:49.350755 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0117 00:19:49.350957 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:49.351007 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:49.351047 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:49.351101 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:49.351105 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0117 00:19:49.351188 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.351262 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0117 00:19:49.351322 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.351412 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:49.352459 39591 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0117 00:19:49.352589 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0117 00:19:49.352588 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0117 00:19:49.352738 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0117 00:19:49.352709 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0117 00:19:49.352777 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0117 00:19:49.352791 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:49.352876 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0117 00:19:49.352842 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0117 00:19:49.352941 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0117 00:19:49.352957 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:49.353006 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.353090 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0117 00:19:49.353202 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0117 00:19:49.353223 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0117 00:19:49.353280 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0117 00:19:49.353415 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:49.353498 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:49.353545 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:49.353578 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.353659 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:49.353741 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:49.353747 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.353918 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:49.353991 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.354070 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0117 00:19:49.354184 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:49.354249 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:49.354323 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.354405 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:49.354439 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0117 00:19:49.354538 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0117 00:19:49.354577 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:49.354463 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0117 00:19:49.354667 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" }, { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" } ] } I0117 00:19:49.354784 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:49.354868 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:49.354910 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:49.354950 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:49.355019 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:49.355063 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:49.355098 39591 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0117 00:19:49.355192 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.355258 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:49.355296 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0117 00:19:49.355328 39591 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0117 00:19:49.355422 39591 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0117 00:19:49.355550 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.355653 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.355709 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:49.355743 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" }] }] } I0117 00:19:49.356001 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0117 00:19:49.356090 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:49.356230 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:49.356341 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.356481 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.356650 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0117 00:19:49.356771 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] }] } I0117 00:19:49.356847 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:49.356909 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.356914 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:49.356970 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:49.357023 39591 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.357021 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.357166 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:49.357212 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" }] }] } I0117 00:19:49.357345 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.357405 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.357465 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0117 00:19:49.357506 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.357513 39591 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.357579 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.357632 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" } ] }], VpcId: "vpc-1" } I0117 00:19:49.357667 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:49.357758 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:49.357750 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" }] }] } I0117 00:19:49.357847 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:49.357862 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.358003 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.358166 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0117 00:19:49.358268 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:49.358311 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:49.358365 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" }] }] } I0117 00:19:49.358507 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-3" } I0117 00:19:49.358569 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.358720 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0117 00:19:49.358770 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0117 00:19:49.358807 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.358950 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:49.358991 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:49.359041 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.359198 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" }] }] } I0117 00:19:49.359306 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:19:49.359390 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0117 00:19:49.359505 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0117 00:19:49.359544 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0117 00:19:49.359581 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" }] }] } I0117 00:19:49.359722 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0117 00:19:49.359861 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0117 00:19:49.359906 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0117 00:19:49.359946 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" }] }] } I0117 00:19:49.360106 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:49.360181 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:49.360270 39591 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0117 00:19:49.360375 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.360410 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:49.360488 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:49.360551 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:49.360612 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-1" } I0117 00:19:49.360575 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-5" },{ SubnetId: "subnet-6" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0117 00:19:49.360649 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.360723 39591 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-5"] }] } I0117 00:19:49.360816 39591 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-5", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }] }] } I0117 00:19:49.360815 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:49.360973 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0117 00:19:49.361028 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-6" } I0117 00:19:49.361065 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.361152 39591 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-6"] }] } I0117 00:19:49.361235 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.361248 39591 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-6", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0117 00:19:49.361324 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0117 00:19:49.361361 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0117 00:19:49.361394 39591 tags.go:42] CreateTags { Resources: ["subnet-6"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0117 00:19:49.361429 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0117 00:19:49.361458 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-3" } I0117 00:19:49.361486 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:49.361590 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0117 00:19:49.361617 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-5" } I0117 00:19:49.361645 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.361705 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0117 00:19:49.361754 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:19:49.361792 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0117 00:19:49.361823 39591 tags.go:42] CreateTags { Resources: ["subnet-5"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0117 00:19:49.361855 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0117 00:19:49.361898 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0117 00:19:49.361969 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0117 00:19:49.361970 39591 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0117 00:19:49.362018 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } W0117 00:19:49.362028 39591 api.go:53] PageSize not implemented I0117 00:19:49.362050 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.362171 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0117 00:19:49.362202 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-4" } I0117 00:19:49.362257 39591 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0117 00:19:49.362323 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.362358 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:49.362395 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:49.362383 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:49.362433 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:49.362495 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:49.362514 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:49.362543 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0117 00:19:49.362526 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:49.362598 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:49.362649 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:49.362592 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0117 00:19:49.362664 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:49.362737 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.362644 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:49.362852 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-3" } I0117 00:19:49.362907 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:49.363003 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-3" } I0117 00:19:49.367022 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:49.367192 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.367296 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.367370 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.367467 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.368344 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:49.368566 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:49.368799 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:49.368846 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:49.368875 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:49.368930 39591 dns.go:235] Pre-creating DNS records I0117 00:19:49.368952 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:49.374136 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0117 00:19:49.377246 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.377313 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:49.943030 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:50.099978 39591 iamrole.go:89] ListRoles: { } I0117 00:19:50.101580 39591 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0117 00:19:50.101987 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:50.101991 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.102187 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.103135 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:50.103756 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.104269 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.104381 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:50.104399 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:50.104429 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:50.105139 39591 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0117 00:19:50.105259 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0117 00:19:50.105279 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.105389 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0117 00:19:50.105398 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:50.105409 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0117 00:19:50.105479 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0117 00:19:50.105488 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:50.105517 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0117 00:19:50.105551 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0117 00:19:50.105684 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:50.105723 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.105841 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.105945 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0117 00:19:50.106075 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:50.106139 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.106274 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0117 00:19:50.106406 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:50.106466 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.106757 39591 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0117 00:19:50.106952 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:50.107029 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.107179 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0117 00:19:50.107320 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] }] } I0117 00:19:50.107432 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0117 00:19:50.107512 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:50.107581 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.107641 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:50.107670 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0117 00:19:50.107701 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0117 00:19:50.107780 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.107892 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.107996 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:50.108043 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.108168 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:50.108249 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.108358 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0117 00:19:50.108385 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.108487 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:50.108515 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.108579 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0117 00:19:50.108605 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0117 00:19:50.108631 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0117 00:19:50.108664 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.108874 39591 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0117 00:19:50.108988 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.109058 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:50.109160 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:50.109178 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.109215 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.109252 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0117 00:19:50.109282 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0117 00:19:50.109083 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:50.109309 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0117 00:19:50.109396 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0117 00:19:50.109488 39591 api.go:53] PageSize not implemented I0117 00:19:50.109489 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.109552 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.109606 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.109665 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0117 00:19:50.109712 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:50.109771 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.109817 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:50.109884 39591 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0117 00:19:50.109937 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:50.109977 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:50.109957 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.109990 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.110037 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:50.110095 39591 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0117 00:19:50.110079 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:50.110158 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:50.110061 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.110175 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.110218 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0117 00:19:50.110154 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:50.110295 39591 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0117 00:19:50.110283 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.110312 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:50.110341 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.110421 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:50.110447 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.114416 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:50.114507 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.114637 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.114699 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.114837 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.115253 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:50.115414 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:50.115628 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:50.118878 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:50.118931 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:50.118962 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:50.118986 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0117 00:19:50.119010 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0117 00:19:50.119035 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:50.119058 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0117 00:19:50.119084 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:50.119107 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:50.119154 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:50.119181 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:19:50.119205 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:50.119236 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:50.119263 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:19:50.119289 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0117 00:19:50.119314 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:50.119339 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:50.119362 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:50.119387 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:50.119413 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:50.119437 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0117 00:19:50.119463 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:50.119489 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:50.119515 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:50.119540 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:50.119567 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:50.119597 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:50.119625 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:50.119652 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0117 00:19:50.119678 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0117 00:19:50.119704 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0117 00:19:50.119731 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:50.119754 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:50.119779 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:50.119803 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:50.119831 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:50.119857 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:50.121510 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:50.121566 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:50.121583 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:50.121618 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121661 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0117 00:19:50.121712 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121760 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121799 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121839 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121878 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.121917 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0117 00:19:50.121969 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.122035 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:50.122061 39591 natgateway.go:117] DescribeNatGateways: { } I0117 00:19:50.122100 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0117 00:19:50.122153 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0117 00:19:50.122200 39591 api.go:53] PageSize not implemented I0117 00:19:50.122215 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:50.122236 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:50.122249 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0117 00:19:50.122281 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:50.122302 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:50.122322 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" ] } I0117 00:19:50.122370 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:50.122401 39591 iamrole.go:89] ListRoles: { } I0117 00:19:50.122444 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:50.122466 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:50.122499 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:50.122538 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:50.122580 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2","rtb-3"] } I0117 00:19:50.122617 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0117 00:19:50.122645 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0117 00:19:50.122669 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:19:50.122693 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } autoscaling-group:nodes.minimal-ipv6.example.com ok I0117 00:19:50.123283 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:19:50.123356 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } I0117 00:19:50.123380 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok I0117 00:19:50.123260 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/kops-controller.internal.minimal-ipv6.example.com. ok I0117 00:19:50.123421 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0117 00:19:50.123457 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } autoscaling-config:lt-2 ok I0117 00:19:50.123533 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0117 00:19:50.123534 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0117 00:19:50.123569 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0117 00:19:50.123556 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } subnet:subnet-2 ok I0117 00:19:50.123603 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0117 00:19:50.123595 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok iam-instance-profile:masters.minimal-ipv6.example.com ok I0117 00:19:50.123659 39591 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok autoscaling-config:lt-1 ok I0117 00:19:50.123769 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:50.123827 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 } ] } W0117 00:19:50.124093 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:50.124131 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:50.124164 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:19:50.124219 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:19:50.124255 39591 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok I0117 00:19:50.124308 39591 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0117 00:19:50.124351 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:50.124393 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0117 00:19:50.124418 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0117 00:19:50.124459 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:50.124493 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0117 00:19:50.124598 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:50.124608 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:19:50.124694 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0117 00:19:50.124707 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0117 00:19:50.124755 39591 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0117 00:19:50.124746 39591 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0117 00:19:50.124766 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0117 00:19:50.124819 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0117 00:19:50.124831 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0117 00:19:50.124857 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0117 00:19:50.124817 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } I0117 00:19:50.124882 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } subnet:subnet-4 ok I0117 00:19:50.124919 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0117 00:19:50.124951 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:50.125006 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0117 00:19:50.125056 39591 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0117 00:19:50.125158 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0117 00:19:50.125214 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:19:50.125276 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:19:50.125338 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (1.52s) === RUN TestLifecycleSharedVPC I0117 00:19:50.125777 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:50.125906 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:50.125943 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:50.125981 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:50.126010 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:50.126049 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:50.126084 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:50.126106 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:50.126160 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:50.126184 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0117 00:19:50.145973 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:50.148652 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.148723 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.715873 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:50.859855 39591 iamrole.go:89] ListRoles: { } I0117 00:19:50.860923 39591 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0117 00:19:50.861397 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:50.861510 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:50.861598 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:50.861725 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:50.861821 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0117 00:19:50.861925 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0117 00:19:50.862028 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:19:50.862152 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:19:50.862191 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:19:50.862468 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:50.862623 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.862743 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:50.862876 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:50.862987 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:50.863212 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0117 00:19:50.863307 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] } I0117 00:19:50.864874 39591 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0117 00:19:50.865019 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0117 00:19:50.864990 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:50.865068 39591 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0117 00:19:50.865107 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:50.865216 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0117 00:19:50.865323 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0117 00:19:50.865240 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0117 00:19:50.865431 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0117 00:19:50.865468 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:50.865717 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0117 00:19:50.865719 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0117 00:19:50.865880 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:50.865953 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:50.866005 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }], VpcId: "vpc-12345678" } I0117 00:19:50.866104 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:50.866196 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:50.866251 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedvpc.example.com" }] }], VpcId: "vpc-12345678" } I0117 00:19:50.866336 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:50.866395 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:50.866445 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:50.866569 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0117 00:19:50.866643 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:50.866703 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] } I0117 00:19:50.867042 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0117 00:19:50.869652 39591 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0117 00:19:50.869850 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.870048 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.870247 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0117 00:19:50.870362 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.870546 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0117 00:19:50.870672 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.870762 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.870903 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.871097 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.871250 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0117 00:19:50.871360 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.871528 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.871676 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.871815 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:50.871860 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" }] }] } I0117 00:19:50.872021 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.872182 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.872361 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:50.872489 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0117 00:19:50.872546 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.872650 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.872782 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.872914 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0117 00:19:50.872971 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0117 00:19:50.873104 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.873504 39591 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0117 00:19:50.873741 39591 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0117 00:19:50.873961 39591 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0117 00:19:50.874009 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:50.874039 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:50.874099 39591 dns.go:235] Pre-creating DNS records I0117 00:19:50.874140 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:50.878567 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:50.881305 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:50.881372 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.448213 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:51.594408 39591 iamrole.go:89] ListRoles: { } I0117 00:19:51.595439 39591 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0117 00:19:51.595742 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.595913 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.596184 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:19:51.596330 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:19:51.596393 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:19:51.596417 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:19:51.596664 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:51.598385 39591 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0117 00:19:51.598508 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.598610 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0117 00:19:51.598753 39591 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0117 00:19:51.598704 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0117 00:19:51.598850 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:51.598898 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.599017 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:51.599050 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:19:51.599151 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0117 00:19:51.599270 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:51.602922 39591 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0117 00:19:51.603101 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:51.603265 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:51.603513 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.603643 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.603705 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:51.603853 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.604057 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.604504 39591 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0117 00:19:51.604689 39591 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0117 00:19:51.604845 39591 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0117 00:19:51.606979 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:51.607030 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:51.607055 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:51.607077 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:51.607100 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:51.607135 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:19:51.607171 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:51.607198 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:51.607227 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:51.607248 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:51.607268 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:51.607297 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:51.607320 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:51.607343 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:51.607365 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:51.607393 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:51.607415 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:51.607434 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:51.607457 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:51.607479 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:51.607504 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:51.608552 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:51.608606 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:51.608623 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:51.608659 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608701 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0117 00:19:51.608742 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608785 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608818 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608853 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608884 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608912 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0117 00:19:51.608950 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.608995 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0117 00:19:51.609021 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0117 00:19:51.609060 39591 api.go:53] PageSize not implemented I0117 00:19:51.609079 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:51.609101 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:51.609130 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:51.609152 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:51.609168 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:19:51.609209 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:51.609242 39591 iamrole.go:89] ListRoles: { } I0117 00:19:51.609278 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:51.609299 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:51.609338 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:51.609369 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:51.609392 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:51.609704 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0117 00:19:51.609758 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } iam-instance-profile:nodes.sharedvpc.example.com ok I0117 00:19:51.609749 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.sharedvpc.example.com ok I0117 00:19:51.609889 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0117 00:19:51.609955 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0117 00:19:51.609824 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0117 00:19:51.610017 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:51.610034 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:19:51.610068 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:51.610028 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.sharedvpc.example.com. ok I0117 00:19:51.610106 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0117 00:19:51.610211 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:51.610228 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:51.610260 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0117 00:19:51.610340 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:19:51.610396 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:19:51.610470 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:51.610485 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0117 00:19:51.610541 39591 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0117 00:19:51.610555 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0117 00:19:51.610582 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0117 00:19:51.610607 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0117 00:19:51.610639 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0117 00:19:51.610648 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0117 00:19:51.610671 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0117 00:19:51.610721 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (1.49s) === RUN TestLifecycleComplex I0117 00:19:51.611152 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:51.611284 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:51.611316 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:51.611347 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:51.611378 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:51.611416 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:51.611449 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:51.611471 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:51.611503 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:51.611523 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0117 00:19:51.639537 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:51.642457 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:51.642516 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.203582 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:52.369681 39591 iamrole.go:89] ListRoles: { } I0117 00:19:52.371262 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:19:52.371621 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:52.371670 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0117 00:19:52.371753 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" } ] } I0117 00:19:52.371824 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:52.371990 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:52.372142 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } W0117 00:19:52.372238 39591 api.go:53] PageSize not implemented I0117 00:19:52.372265 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.372404 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0117 00:19:52.372439 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.372607 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.372725 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:52.372770 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.372811 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0117 00:19:52.372903 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:52.372936 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] } I0117 00:19:52.373033 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:52.373087 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:52.373140 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:52.373168 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:52.373200 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:52.373229 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.373351 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:52.373467 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:52.373503 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:52.373999 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:19:52.374143 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:52.374176 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0117 00:19:52.374134 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:52.374199 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:52.374267 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:52.374333 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.374380 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0117 00:19:52.374432 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:52.374486 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:52.374583 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0117 00:19:52.374540 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0117 00:19:52.374586 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:52.374574 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-utility.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:52.374665 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:52.374715 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:52.374765 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:52.374741 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0117 00:19:52.374801 39591 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0117 00:19:52.374835 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:52.374974 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:52.375038 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:52.375239 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0117 00:19:52.375341 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:52.375442 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:52.375511 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0117 00:19:52.375593 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.375667 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:52.375752 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.375821 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.375899 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:52.375937 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:52.375993 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:52.375987 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0117 00:19:52.376027 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0117 00:19:52.376105 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:52.376159 39591 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0117 00:19:52.375948 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0117 00:19:52.376212 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0117 00:19:52.376316 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0117 00:19:52.376367 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0117 00:19:52.376478 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:52.376525 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0117 00:19:52.376608 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:52.376647 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:52.376690 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:52.376790 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0117 00:19:52.376846 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:52.376893 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:52.376932 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:52.376966 39591 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0117 00:19:52.377042 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:52.377086 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0117 00:19:52.377177 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:52.377262 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:19:52.377416 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.377558 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.377737 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0117 00:19:52.377868 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0117 00:19:52.377996 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" } ] }] } I0117 00:19:52.378188 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0117 00:19:52.378319 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0117 00:19:52.378445 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.378558 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.378729 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0117 00:19:52.378853 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:52.378920 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:52.379004 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:52.379069 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:52.379077 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0117 00:19:52.379164 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:52.379216 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0117 00:19:52.379306 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:52.379364 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0117 00:19:52.379531 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.379717 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.379840 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0117 00:19:52.379937 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.380099 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.380245 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.380366 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-1", TransitGatewayId: "tgw-0123456" } I0117 00:19:52.380415 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0117 00:19:52.380538 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0117 00:19:52.380615 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0117 00:19:52.380653 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0117 00:19:52.380683 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0117 00:19:52.380772 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:52.380815 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:52.380845 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0117 00:19:52.380957 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.381067 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:52.381102 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0117 00:19:52.381188 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0117 00:19:52.381297 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0117 00:19:52.381369 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-1", TransitGatewayId: "tgw-123456" } I0117 00:19:52.381404 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0117 00:19:52.381515 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:52.381550 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:52.381608 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0117 00:19:52.381668 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0117 00:19:52.381739 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:19:52.381808 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:52.381912 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0117 00:19:52.381806 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0117 00:19:52.381940 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } W0117 00:19:52.381948 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:52.382045 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-2" }], Tags: [ { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" } ], Type: "network" } I0117 00:19:52.382138 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:52.382180 39591 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0117 00:19:52.382254 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0117 00:19:52.382307 39591 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:52.382368 39591 api.go:53] PageSize not implemented I0117 00:19:52.382413 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:19:52.382456 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:52.382498 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:52.382483 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:52.382535 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:52.382514 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:52.382621 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:52.382691 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:52.382614 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:52.382708 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:52.382721 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:52.386783 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:19:52.386934 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.387028 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.387161 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.388455 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.389437 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:52.389821 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:52.390446 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:19:52.390557 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:52.390630 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:52.390742 39591 dns.go:235] Pre-creating DNS records I0117 00:19:52.390781 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:52.399697 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:52.404020 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.404102 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:52.966808 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:53.125752 39591 iamrole.go:89] ListRoles: { } I0117 00:19:53.127085 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:19:53.127350 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0117 00:19:53.127412 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:53.127437 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:53.127502 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:53.127554 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:53.127703 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:53.127800 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:53.127870 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0117 00:19:53.129243 39591 api.go:53] PageSize not implemented I0117 00:19:53.127906 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.130365 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:53.130594 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0117 00:19:53.131018 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.133010 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:19:53.133448 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:53.133543 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:53.133583 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:53.133595 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.133683 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:53.133727 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.133854 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:53.133833 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:53.133880 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:53.133987 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:53.134032 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:53.134102 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:53.134036 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.134189 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.134259 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.134323 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.134385 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.134981 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:53.135161 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:53.135228 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:53.135275 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.135396 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:53.135427 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:53.135572 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:53.135620 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.135918 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:19:53.136015 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.136191 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.136290 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.136644 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.136729 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.136973 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.137039 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.137171 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:53.137269 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:19:53.137321 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.137345 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:53.137414 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.137429 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.137465 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.137491 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:53.137524 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:53.137552 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:53.137579 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:53.137652 39591 api.go:53] PageSize not implemented I0117 00:19:53.137705 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:19:53.137761 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:53.137756 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:53.137812 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.137795 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:53.137827 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.137851 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:53.137910 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0117 00:19:53.137944 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0117 00:19:53.137954 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.137969 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:53.137996 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.138052 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:53.138080 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.138170 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.142960 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:19:53.143051 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.143201 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.143263 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.143410 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.143867 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:53.144064 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:53.144287 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0117 00:19:53.149196 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:53.152070 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.161865 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:53.165343 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.165418 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.730026 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:53.899262 39591 iamrole.go:89] ListRoles: { } I0117 00:19:53.900871 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:19:53.901078 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:53.901144 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:53.901387 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:53.901548 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:53.901759 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.901938 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.902036 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:53.902061 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:53.902110 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.902168 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:53.902298 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0117 00:19:53.902848 39591 api.go:53] PageSize not implemented I0117 00:19:53.903054 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.903884 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:19:53.903988 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.904107 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:53.904188 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:53.904137 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:53.904168 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:53.904253 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:53.904300 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:53.904389 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:53.904387 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.904431 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:53.904483 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.904535 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:53.904550 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:53.904576 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:53.904597 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.904728 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:53.904760 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.904826 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:53.904892 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.904999 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.905103 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:53.905155 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:53.905275 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:53.905354 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:53.905529 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.905683 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:19:53.905845 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.905953 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.906361 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.906437 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.906496 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.906559 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:53.906673 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:53.906723 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:53.907006 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:19:53.907072 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:53.907143 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.907082 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:53.907157 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.907188 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.907214 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:53.907243 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:53.907270 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:53.907293 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:53.907423 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0117 00:19:53.907448 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:53.907471 39591 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0117 00:19:53.907494 39591 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0117 00:19:53.907515 39591 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0117 00:19:53.907589 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0117 00:19:53.907641 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.907665 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0117 00:19:53.907694 39591 api.go:53] PageSize not implemented I0117 00:19:53.907732 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:19:53.907772 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:53.907808 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.907800 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:53.907840 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:53.907818 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.907895 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:53.907947 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:53.907952 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:53.908011 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:53.908032 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.908134 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:53.908185 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.908276 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:53.908312 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:53.912305 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:19:53.912470 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.912637 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.912806 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.912955 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.914666 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:53.915110 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:53.915537 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0117 00:19:53.915602 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:53.915631 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:53.915726 39591 dns.go:235] Pre-creating DNS records I0117 00:19:53.925338 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:53.929892 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:53.929973 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.492020 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:54.653813 39591 iamrole.go:89] ListRoles: { } I0117 00:19:54.654955 39591 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0117 00:19:54.655193 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:54.655266 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:54.655430 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.655937 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0117 00:19:54.657423 39591 api.go:53] PageSize not implemented I0117 00:19:54.657762 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:54.657928 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.658055 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:54.658087 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:54.658180 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:54.658227 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:54.658343 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:54.658433 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.662585 39591 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0117 00:19:54.662708 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:54.662859 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:54.662857 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:54.662964 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:54.662955 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:54.663043 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:54.663065 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:54.663030 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.663156 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.663176 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:54.663237 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:54.663242 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:54.663237 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:54.663314 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:54.663416 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:54.663479 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:54.663532 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:54.663638 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.663765 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:54.663797 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.663897 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:54.663962 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:54.664024 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.664131 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:54.664247 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:54.664480 39591 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0117 00:19:54.664634 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:54.664710 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:54.664795 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:54.664926 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:54.665234 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:54.665377 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:54.665543 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.665661 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:54.665819 39591 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0117 00:19:54.665883 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:54.665936 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:54.665951 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.665984 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.665887 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:54.666010 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:54.666086 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:54.666132 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:54.666162 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:54.666242 39591 api.go:53] PageSize not implemented I0117 00:19:54.666286 39591 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0117 00:19:54.666341 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:54.666331 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:54.666376 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:54.666377 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:54.666400 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:54.666458 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:54.666390 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.666589 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:54.666627 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.666715 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:54.666776 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:54.666797 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.666886 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:54.666914 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:54.670847 39591 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0117 00:19:54.670958 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.671092 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.671255 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.671386 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.671774 39591 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0117 00:19:54.671958 39591 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0117 00:19:54.672164 39591 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0117 00:19:54.674988 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:54.677940 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:54.688029 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:54.691504 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:54.691576 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.254053 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:55.421434 39591 iamrole.go:89] ListRoles: { } I0117 00:19:55.422906 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:55.423189 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0117 00:19:55.423308 39591 api.go:53] PageSize not implemented I0117 00:19:55.423372 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:55.423447 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.423613 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0117 00:19:55.423723 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:55.423784 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:55.423840 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.423950 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:55.423984 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:55.424040 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:55.424086 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:55.424215 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:55.424326 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.426372 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:55.426583 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.426671 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:55.426687 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:55.426715 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:55.426675 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:55.426770 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:55.426792 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:55.426762 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:55.426870 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:55.426868 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:55.426941 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:55.426925 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:55.427010 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:55.427036 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:55.427100 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:55.427246 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.427371 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:55.427486 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:55.427520 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:55.427587 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.427697 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:55.427726 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:55.427790 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.427886 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:55.427944 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.428178 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:55.428274 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:55.428375 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:55.428503 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:55.428650 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:55.428744 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:55.428917 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:55.429012 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:55.429204 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:55.429510 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:55.429569 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:55.429599 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:55.429672 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:55.429687 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.429713 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.429741 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:55.429771 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:55.429799 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:55.429822 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:55.429893 39591 api.go:53] PageSize not implemented I0117 00:19:55.429948 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:55.429988 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:55.430025 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:55.430033 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:55.430128 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:55.430037 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.430153 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:55.430201 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:55.430217 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:55.430235 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.430323 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:55.430357 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:55.430375 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.430477 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:55.430523 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:55.434634 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:55.434757 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.434898 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.434961 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.435097 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.435542 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.435598 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.435741 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:55.435916 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:55.436083 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:55.436142 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:55.436174 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:55.436233 39591 dns.go:235] Pre-creating DNS records I0117 00:19:55.442765 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:55.446297 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:55.446374 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.011360 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:56.170176 39591 iamrole.go:89] ListRoles: { } I0117 00:19:56.171415 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:56.171619 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0117 00:19:56.171972 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.172096 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0117 00:19:56.172174 39591 api.go:53] PageSize not implemented I0117 00:19:56.172220 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.172459 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:56.172610 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:56.172750 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.172805 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:56.172866 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:56.172892 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:56.172939 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.172973 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:56.173063 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:56.176573 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:56.177181 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:56.177307 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:56.177040 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.177358 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:56.177504 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:56.177491 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:56.177850 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.178054 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:56.178021 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:56.178110 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.178684 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.178810 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:56.178907 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:56.178942 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:56.178864 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:56.179013 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.179095 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.179207 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.179321 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.179399 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:56.179529 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.180196 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:56.180248 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:56.180436 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:56.180526 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:56.180688 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:56.180856 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.181043 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.181180 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.181329 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.181504 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.181708 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.181860 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:56.181989 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.182103 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:56.182173 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.182198 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:56.182270 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.182285 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.182319 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.182343 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:56.182372 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:56.182398 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:56.182420 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:56.182489 39591 api.go:53] PageSize not implemented I0117 00:19:56.182541 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:56.182582 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:56.182618 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.182618 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:56.182670 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:56.182631 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.182761 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:56.182832 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:56.182826 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:56.182893 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.182916 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.183005 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:56.183042 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.183145 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:56.183180 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.187409 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:56.187508 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.187641 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.187768 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.187894 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.188420 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:56.188632 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:56.188803 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0117 00:19:56.192609 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:56.195396 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.195461 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.202995 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:56.206323 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.206391 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.206428 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.770545 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:56.928926 39591 iamrole.go:89] ListRoles: { } I0117 00:19:56.930423 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:56.930750 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0117 00:19:56.930949 39591 api.go:53] PageSize not implemented I0117 00:19:56.930886 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0117 00:19:56.931050 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:56.931092 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:56.931160 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.931200 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0117 00:19:56.931279 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:56.931293 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:56.931366 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.931484 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.931630 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:56.931714 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.931868 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:56.933473 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:56.933609 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:56.933755 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:56.933836 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:56.933869 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:56.933871 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:56.933821 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.934009 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:56.933990 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.933989 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:56.934076 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:56.934102 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:56.934111 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:56.934203 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:56.934248 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:56.934398 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:56.934460 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.934569 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0117 00:19:56.934698 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.934837 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:56.934878 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:56.935018 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:56.935084 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.935200 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.935303 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0117 00:19:56.935399 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:56.935498 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:56.935645 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.935785 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:56.935976 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.936133 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:56.936256 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.936443 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.936558 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:56.936691 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.936921 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:56.936979 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:56.937007 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:56.937075 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.937089 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.937145 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.937176 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:56.937207 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:56.937233 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:56.937255 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:56.937325 39591 api.go:53] PageSize not implemented I0117 00:19:56.937367 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:56.937407 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:56.937444 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.937456 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.937481 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:56.937534 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:56.937532 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0117 00:19:56.937564 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0117 00:19:56.937583 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:56.937593 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:56.937600 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.937677 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:56.937728 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.937843 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:56.937866 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:56.941873 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:56.941977 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.942156 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.942289 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.942411 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.942821 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:56.943081 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:56.943281 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:56.943321 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:56.943351 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:56.943410 39591 dns.go:235] Pre-creating DNS records I0117 00:19:56.949734 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:56.953128 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.953202 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:56.953244 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.517019 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:57.671043 39591 iamrole.go:89] ListRoles: { } I0117 00:19:57.672708 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:57.672977 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.673261 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0117 00:19:57.673688 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:57.673883 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0117 00:19:57.674163 39591 api.go:53] PageSize not implemented I0117 00:19:57.674327 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:57.674716 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.674812 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:57.674890 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:57.675069 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.675194 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:57.675219 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:57.675225 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:57.675265 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:57.676618 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:57.676769 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.676838 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:57.676940 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:57.676907 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:57.676918 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:57.677048 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:57.677086 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:57.677019 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:57.677150 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:57.677205 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:57.677228 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:57.677183 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:57.677339 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:57.677388 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:57.677471 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.677576 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:57.677604 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:57.677668 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:57.677779 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:57.677840 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:57.678008 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:57.678048 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.678183 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:57.678218 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.678325 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.678453 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:57.678623 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:57.678704 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:57.678938 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:57.679152 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:57.679397 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:57.679509 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:57.679659 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:57.679727 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:57.679852 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:57.679936 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:57.679997 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:57.680012 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.680046 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.679933 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:57.680074 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:57.680137 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:57.680173 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:57.680197 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:57.680266 39591 api.go:53] PageSize not implemented I0117 00:19:57.680307 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:57.680366 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:57.680418 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:57.680386 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:57.680473 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:57.680439 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.680508 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:57.680565 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:57.680584 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:57.680609 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.680681 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:57.680735 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:57.680755 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.680845 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:57.680870 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:57.684901 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:57.685085 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.685242 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.685307 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.685460 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.686191 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:57.686407 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:57.686635 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0117 00:19:57.688976 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:57.691850 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.691922 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.691958 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.699808 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:57.703263 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.703336 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.703378 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:57.703413 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.271930 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:58.433545 39591 iamrole.go:89] ListRoles: { } I0117 00:19:58.435191 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:58.435467 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.435571 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:58.435599 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:58.435644 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0117 00:19:58.435671 39591 api.go:53] PageSize not implemented I0117 00:19:58.435684 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.435791 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:58.435881 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.435991 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:58.436063 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0117 00:19:58.436179 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:58.436251 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0117 00:19:58.436298 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:58.436443 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:58.437773 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:58.437926 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:58.437893 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.438020 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.438071 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:58.438168 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:58.438213 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:58.438224 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:58.438147 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:58.438290 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:58.438341 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:58.438363 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:58.438317 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:58.438500 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:58.438546 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:58.438596 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:58.438670 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:58.438753 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.438861 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:58.438928 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:58.439044 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:58.439078 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:58.439158 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:58.439222 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.439321 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.439423 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:58.439616 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:58.439840 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:58.440024 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:58.440087 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:58.440289 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:58.440413 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:58.440496 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:58.440570 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:58.440655 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:58.440807 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:58.440873 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0117 00:19:58.440879 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0117 00:19:58.440928 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:58.440999 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.441041 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.441075 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:58.441106 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:58.441154 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:58.441180 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:58.441258 39591 api.go:53] PageSize not implemented I0117 00:19:58.441307 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:58.441351 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:58.441394 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:58.441405 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:58.441407 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.441457 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:58.441478 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:58.441503 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.441559 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:58.441604 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:58.441589 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:58.441681 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:58.441718 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.441797 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:58.441824 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:58.446206 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:58.446324 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.446457 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.446536 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.446683 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.447501 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:58.447787 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:58.447933 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:58.447965 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:58.447993 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:58.448049 39591 dns.go:235] Pre-creating DNS records I0117 00:19:58.454576 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0117 00:19:58.458099 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.458192 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.458235 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:58.458271 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.021671 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:59.182044 39591 iamrole.go:89] ListRoles: { } I0117 00:19:59.183734 39591 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0117 00:19:59.184231 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0117 00:19:59.184390 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } W0117 00:19:59.184592 39591 api.go:53] PageSize not implemented I0117 00:19:59.184538 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0117 00:19:59.184667 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0117 00:19:59.184775 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.184912 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.185010 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0117 00:19:59.185148 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.185376 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.185446 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:19:59.185471 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:19:59.185507 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.185505 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:59.187221 39591 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0117 00:19:59.187388 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0117 00:19:59.187487 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0117 00:19:59.187561 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:59.187584 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:59.187522 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.187651 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0117 00:19:59.187670 39591 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:59.187698 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.187731 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0117 00:19:59.187809 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:59.187793 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.187849 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0117 00:19:59.187900 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:19:59.187942 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.188011 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.188073 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:59.188143 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0117 00:19:59.188269 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:59.188326 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.188470 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0117 00:19:59.188599 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:59.188640 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.188736 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.188847 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:59.188877 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.188996 39591 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0117 00:19:59.189186 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:59.189312 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:59.189434 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:59.189634 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.189797 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:19:59.189904 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.190027 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0117 00:19:59.190199 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.190369 39591 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0117 00:19:59.190428 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.190446 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:59.190511 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:59.190527 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.190555 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.190577 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0117 00:19:59.190605 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0117 00:19:59.190627 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0117 00:19:59.190653 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0117 00:19:59.190718 39591 api.go:53] PageSize not implemented I0117 00:19:59.190765 39591 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0117 00:19:59.190805 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:59.190839 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:59.190842 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:59.190849 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.190891 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:59.190912 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:59.190909 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:19:59.190953 39591 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0117 00:19:59.190933 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.191017 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0117 00:19:59.191037 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.191094 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:59.191153 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:59.191165 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.194928 39591 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0117 00:19:59.195047 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.195224 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.195289 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.195425 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.195865 39591 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0117 00:19:59.196055 39591 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0117 00:19:59.196229 39591 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0117 00:19:59.196354 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:19:59.196397 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:59.196427 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:19:59.196451 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:19:59.196473 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:19:59.196494 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:19:59.196517 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:59.196544 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:19:59.196575 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:19:59.196602 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:19:59.196623 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:19:59.196645 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:59.196671 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:19:59.196691 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:19:59.196716 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:59.196738 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:59.196761 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:19:59.196783 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:59.196807 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:19:59.196827 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:19:59.196851 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0117 00:19:59.196875 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:19:59.196895 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:19:59.196915 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:59.196938 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:59.196962 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:59.196992 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:19:59.199137 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:19:59.199186 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:19:59.199203 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:19:59.199234 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199275 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0117 00:19:59.199324 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199366 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199401 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199442 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199472 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199505 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0117 00:19:59.199544 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199623 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0117 00:19:59.199651 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0117 00:19:59.199696 39591 api.go:53] PageSize not implemented I0117 00:19:59.199711 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:19:59.199728 39591 loadbalancers.go:35] PageSize not implemented I0117 00:19:59.199739 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0117 00:19:59.199766 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:19:59.199782 39591 targetgroups.go:35] PageSize not implemented I0117 00:19:59.199795 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" ] } I0117 00:19:59.199848 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:19:59.199878 39591 iamrole.go:89] ListRoles: { } I0117 00:19:59.199913 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:59.199931 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:59.199963 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:19:59.199998 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:19:59.200037 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1"] } I0117 00:19:59.200465 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:19:59.200515 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0117 00:19:59.200486 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } autoscaling-group:master-us-test-1a.masters.complex.example.com ok autoscaling-group:nodes.complex.example.com ok I0117 00:19:59.200552 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0117 00:19:59.200563 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } autoscaling-config:lt-1 ok I0117 00:19:59.200600 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0117 00:19:59.200630 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0117 00:19:59.200679 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:59.200698 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5 ok I0117 00:19:59.200555 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.complex.example.com ok I0117 00:19:59.200784 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0117 00:19:59.200863 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0117 00:19:59.200728 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 } ] } W0117 00:19:59.200903 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:59.200878 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4 ok I0117 00:19:59.200918 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:19:59.200950 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:59.200987 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0117 00:19:59.201266 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:19:59.201285 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:19:59.201319 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:19:59.201388 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:19:59.201433 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:19:59.201469 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0117 00:19:59.201553 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0117 00:19:59.201594 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0117 00:19:59.201606 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0117 00:19:59.201583 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:19:59.201633 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0117 00:19:59.201660 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0117 00:19:59.201690 39591 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0117 00:19:59.201700 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0117 00:19:59.201723 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0117 00:19:59.201657 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0117 00:19:59.201786 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0117 00:19:59.201856 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:19:59.201916 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (7.59s) === RUN TestLifecycleExternalLB I0117 00:19:59.202365 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:19:59.202489 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:19:59.202519 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:19:59.202551 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:19:59.202579 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:19:59.202617 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:19:59.202650 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:19:59.202673 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:19:59.202702 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:19:59.202723 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0117 00:19:59.227374 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:59.230416 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.230489 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.791413 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:59.940553 39591 iamrole.go:89] ListRoles: { } I0117 00:19:59.941669 39591 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0117 00:19:59.942080 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:19:59.942230 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.942445 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } W0117 00:19:59.942529 39591 api.go:53] PageSize not implemented I0117 00:19:59.942600 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:19:59.942688 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:19:59.942636 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.942723 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0117 00:19:59.942744 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0117 00:19:59.942797 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.942845 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] } I0117 00:19:59.942876 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:19:59.942906 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:19:59.942862 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:19:59.942932 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:19:59.942959 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:19:59.942971 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.943001 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0117 00:19:59.943066 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0117 00:19:59.943086 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0117 00:19:59.943022 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } W0117 00:19:59.943139 39591 api.go:53] PageSize not implemented I0117 00:19:59.943163 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0117 00:19:59.943167 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:19:59.943222 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0117 00:19:59.943220 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.943288 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0117 00:19:59.943353 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.943441 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:19:59.943477 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.943600 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:19:59.943698 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:19:59.943737 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } W0117 00:19:59.943871 39591 api.go:53] PageSize not implemented I0117 00:19:59.945321 39591 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0117 00:19:59.945461 39591 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0117 00:19:59.945449 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0117 00:19:59.945575 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0117 00:19:59.945569 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.945641 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0117 00:19:59.945665 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:59.945747 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0117 00:19:59.945772 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:19:59.945825 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:19:59.945870 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["externallb.example.com"] }] } I0117 00:19:59.945966 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:19:59.946055 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:19:59.946069 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:59.946108 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0117 00:19:59.946135 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:19:59.946292 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0117 00:19:59.946476 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:19:59.946555 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:19:59.946605 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:19:59.946641 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.946792 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.946863 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:19:59.946947 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:19:59.946983 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" } ] } I0117 00:19:59.947041 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:19:59.947088 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:19:59.947035 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.externallb.example.com" } ] }], VpcId: "vpc-1" } I0117 00:19:59.947171 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:19:59.947210 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:19:59.947414 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0117 00:19:59.949937 39591 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0117 00:19:59.950101 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.950315 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.950491 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:59.950568 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.950763 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.950912 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.951099 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.951323 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.951470 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.951591 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:19:59.951688 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" }] }] } I0117 00:19:59.951841 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.951960 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.952046 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.952269 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:19:59.952337 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0117 00:19:59.952526 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.952721 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.952834 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.952937 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0117 00:19:59.953152 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0117 00:19:59.953347 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" }] }] } I0117 00:19:59.953480 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:19:59.953530 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0117 00:19:59.953568 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" }] }] } I0117 00:19:59.953785 39591 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0117 00:19:59.954047 39591 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0117 00:19:59.954262 39591 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0117 00:19:59.954312 39591 zones.go:93] ListHostedZonesPages { } I0117 00:19:59.954343 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:59.954396 39591 dns.go:235] Pre-creating DNS records I0117 00:19:59.954420 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:19:59.964831 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:19:59.968424 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:19:59.968506 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.532263 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:00.675974 39591 iamrole.go:89] ListRoles: { } I0117 00:20:00.677179 39591 executor.go:111] Tasks: 0 done / 107 total; 51 can run W0117 00:20:00.677670 39591 api.go:53] PageSize not implemented I0117 00:20:00.677635 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0117 00:20:00.677714 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:00.677773 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0117 00:20:00.677876 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:00.677902 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:20:00.677972 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.678037 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:20:00.678102 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0117 00:20:00.678093 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.678187 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:20:00.678213 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:20:00.678250 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:00.678245 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0117 00:20:00.678551 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.678820 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.679241 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:20:00.679333 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:20:00.679360 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } W0117 00:20:00.679691 39591 api.go:53] PageSize not implemented W0117 00:20:00.679743 39591 api.go:53] PageSize not implemented I0117 00:20:00.680769 39591 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0117 00:20:00.680929 39591 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0117 00:20:00.680964 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0117 00:20:00.681064 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0117 00:20:00.681095 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.681259 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:00.681345 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0117 00:20:00.681462 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:00.681537 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:00.681639 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.681751 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:00.681806 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.681909 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:20:00.685518 39591 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0117 00:20:00.685763 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:00.685856 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:00.686050 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:00.686207 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.686352 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.686512 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.686572 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.687184 39591 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0117 00:20:00.687395 39591 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0117 00:20:00.687618 39591 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0117 00:20:00.690000 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:20:00.690056 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:20:00.690086 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:20:00.690111 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:00.690157 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:20:00.690179 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:20:00.690204 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:20:00.690232 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:20:00.690258 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:20:00.690285 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:20:00.690315 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:20:00.690338 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:20:00.690360 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:20:00.690386 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:20:00.690408 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:00.690431 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:00.690454 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:20:00.690478 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:00.690501 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:00.690526 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:20:00.690548 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:00.690571 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:00.690596 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:20:00.690620 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:20:00.691734 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:20:00.691791 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:20:00.691807 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:20:00.691842 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.691885 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0117 00:20:00.691925 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.691970 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692009 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692052 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692085 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692130 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0117 00:20:00.692170 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692210 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0117 00:20:00.692240 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0117 00:20:00.692281 39591 api.go:53] PageSize not implemented I0117 00:20:00.692298 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:00.692318 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:00.692332 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:20:00.692348 39591 targetgroups.go:35] PageSize not implemented I0117 00:20:00.692362 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:20:00.692404 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:20:00.692434 39591 iamrole.go:89] ListRoles: { } I0117 00:20:00.692475 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:00.692497 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:00.692533 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:20:00.692568 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:20:00.692595 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-config:lt-1 ok autoscaling-group:nodes.externallb.example.com ok I0117 00:20:00.692957 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-group:master-us-test-1a.masters.externallb.example.com ok autoscaling-config:lt-2 ok I0117 00:20:00.693030 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0117 00:20:00.693076 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0117 00:20:00.693059 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:20:00.693107 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0117 00:20:00.693161 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok I0117 00:20:00.693166 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:00.693061 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.externallb.example.com. ok I0117 00:20:00.693243 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:00.693311 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0117 00:20:00.693500 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:00.693522 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:20:00.693561 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:20:00.693603 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0117 00:20:00.693693 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:00.693711 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:20:00.693735 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:20:00.693778 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:20:00.693862 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0117 00:20:00.693900 39591 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0117 00:20:00.693878 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:20:00.693912 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0117 00:20:00.693940 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0117 00:20:00.693978 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0117 00:20:00.694010 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0117 00:20:00.694019 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0117 00:20:00.694038 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0117 00:20:00.694087 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:20:00.694168 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:20:00.694228 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (1.49s) === RUN TestLifecycleSharedSubnet I0117 00:20:00.694643 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:20:00.694765 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:20:00.694794 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:20:00.694824 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:20:00.694854 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:20:00.694896 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:20:00.694927 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:20:00.694950 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:20:00.694982 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:20:00.695002 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0117 00:20:00.713878 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:00.717284 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:00.717381 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.280151 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:01.423408 39591 iamrole.go:89] ListRoles: { } I0117 00:20:01.424306 39591 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0117 00:20:01.424527 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:01.424759 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:01.424811 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:01.424908 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:01.424963 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:01.425138 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.425269 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:01.425441 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:01.425569 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:01.425477 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0117 00:20:01.425636 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0117 00:20:01.425948 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:01.426028 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:01.426055 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:01.426241 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0117 00:20:01.426327 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0117 00:20:01.427571 39591 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0117 00:20:01.427666 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0117 00:20:01.427683 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:01.427779 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0117 00:20:01.427787 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0117 00:20:01.427904 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0117 00:20:01.427950 39591 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0117 00:20:01.427897 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0117 00:20:01.428104 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:01.428209 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:01.428246 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:01.428268 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0117 00:20:01.428274 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:01.428362 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:01.428415 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:01.428447 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0117 00:20:01.428601 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:01.428639 39591 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] } I0117 00:20:01.429376 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0117 00:20:01.432104 39591 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0117 00:20:01.432280 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.432378 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.432479 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.432679 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.432804 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.432998 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.433082 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.433216 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0117 00:20:01.433409 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0117 00:20:01.433538 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0117 00:20:01.433647 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.433783 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0117 00:20:01.433896 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.433997 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" }] }] } I0117 00:20:01.434106 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.434244 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.434345 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" }] }] } I0117 00:20:01.434447 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0117 00:20:01.434562 39591 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0117 00:20:01.434741 39591 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0117 00:20:01.434942 39591 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0117 00:20:01.434985 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:01.435015 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:01.435074 39591 dns.go:235] Pre-creating DNS records I0117 00:20:01.435100 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:01.439700 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:01.442368 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:01.442436 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.009144 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:02.154564 39591 iamrole.go:89] ListRoles: { } I0117 00:20:02.155582 39591 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0117 00:20:02.156001 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.156489 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:02.156562 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:02.156608 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:02.156703 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:02.156766 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:02.156818 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] }] } I0117 00:20:02.158581 39591 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0117 00:20:02.158856 39591 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0117 00:20:02.158850 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:02.158998 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0117 00:20:02.158957 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0117 00:20:02.159103 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0117 00:20:02.159252 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:02.159293 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0117 00:20:02.159405 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:02.163287 39591 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0117 00:20:02.163448 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.163593 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.163732 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.163909 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.164394 39591 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0117 00:20:02.164602 39591 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0117 00:20:02.164820 39591 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0117 00:20:02.166861 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:20:02.166912 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:20:02.166937 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:02.166964 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:20:02.166989 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:20:02.167012 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:20:02.167036 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:20:02.167066 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:20:02.167092 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:20:02.167134 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:20:02.167159 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:20:02.167179 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:02.167200 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:02.167225 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:02.167248 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:02.167271 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:20:02.167290 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:02.167314 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:02.167338 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:20:02.168381 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:20:02.168432 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:20:02.168449 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:20:02.168484 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168522 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0117 00:20:02.168563 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168607 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168637 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168669 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168702 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168728 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0117 00:20:02.168758 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168793 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0117 00:20:02.168818 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0117 00:20:02.168854 39591 api.go:53] PageSize not implemented I0117 00:20:02.168873 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:02.168893 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:02.168909 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:20:02.168928 39591 targetgroups.go:35] PageSize not implemented I0117 00:20:02.168943 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0117 00:20:02.168987 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:20:02.169021 39591 iamrole.go:89] ListRoles: { } I0117 00:20:02.169057 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:02.169080 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:02.169128 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:20:02.169163 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:20:02.169448 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } autoscaling-config:lt-2 ok autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok I0117 00:20:02.169503 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok I0117 00:20:02.169559 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0117 00:20:02.169597 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0117 00:20:02.169543 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-config:lt-1 ok autoscaling-group:nodes.sharedsubnet.example.com ok iam-instance-profile:nodes.sharedsubnet.example.com ok I0117 00:20:02.169577 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.sharedsubnet.example.com. ok I0117 00:20:02.169688 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0117 00:20:02.169909 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:02.169932 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:20:02.169974 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:20:02.170018 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:20:02.170053 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:02.170099 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0117 00:20:02.170211 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:02.170229 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:20:02.170263 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0117 00:20:02.170393 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0117 00:20:02.170436 39591 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0117 00:20:02.170449 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0117 00:20:02.170480 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok I0117 00:20:02.170510 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0117 00:20:02.170545 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0117 00:20:02.170555 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0117 00:20:02.170576 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (1.48s) === RUN TestLifecyclePrivateSharedSubnet I0117 00:20:02.170978 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:20:02.171108 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:20:02.171161 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:20:02.171194 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:20:02.171224 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:20:02.171262 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:20:02.171298 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:20:02.171321 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:20:02.171354 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:20:02.171381 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0117 00:20:02.193623 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:02.196449 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.196517 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.196561 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.763332 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:02.908239 39591 iamrole.go:89] ListRoles: { } I0117 00:20:02.909682 39591 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0117 00:20:02.910321 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0117 00:20:02.910441 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] } I0117 00:20:02.910614 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0117 00:20:02.910696 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:02.910794 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:02.910713 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0117 00:20:02.910835 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:02.910932 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:02.910967 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:02.911011 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:02.911213 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:02.911384 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:02.911452 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0117 00:20:02.911526 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0117 00:20:02.911438 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:02.911656 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:02.911767 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:02.911807 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.912568 39591 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0117 00:20:02.912699 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0117 00:20:02.912733 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0117 00:20:02.912827 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0117 00:20:02.912860 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0117 00:20:02.912817 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0117 00:20:02.912830 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:02.912969 39591 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0117 00:20:02.912929 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0117 00:20:02.913009 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0117 00:20:02.912966 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0117 00:20:02.913149 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0117 00:20:02.913133 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0117 00:20:02.913101 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0117 00:20:02.913320 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:02.913417 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:02.913464 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:02.913481 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0117 00:20:02.913502 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0117 00:20:02.913675 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0117 00:20:02.913843 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:02.913922 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:02.913959 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:02.913989 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0117 00:20:02.914146 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0117 00:20:02.914314 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:02.914356 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0117 00:20:02.914430 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:02.914464 39591 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" }] } I0117 00:20:02.914516 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:02.914598 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:20:02.914635 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:02.914671 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:20:02.914734 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:02.914545 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0117 00:20:02.914766 39591 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" },{ Key: "kubernetes.io/role/elb", Value: "1" }] } I0117 00:20:02.914876 39591 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0117 00:20:02.915038 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } W0117 00:20:02.915171 39591 api.go:53] PageSize not implemented I0117 00:20:02.915271 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:02.915109 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0117 00:20:02.915270 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } W0117 00:20:02.915378 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:02.915350 39591 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "Name", Value: "api.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0117 00:20:02.915398 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0117 00:20:02.915460 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" }], Type: "network" } I0117 00:20:02.915513 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:02.915501 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.915563 39591 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0117 00:20:02.915637 39591 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0117 00:20:02.915672 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.915829 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:20:02.915953 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.916105 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.916286 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.916388 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.916500 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:20:02.916573 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.916671 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0117 00:20:02.916744 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0117 00:20:02.916896 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.917018 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.917142 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0117 00:20:02.917173 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.917210 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } W0117 00:20:02.917302 39591 api.go:53] PageSize not implemented I0117 00:20:02.917324 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:02.917282 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0117 00:20:02.917393 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0117 00:20:02.917469 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.917556 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.917636 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0117 00:20:02.917777 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.917889 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0117 00:20:02.917999 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" }] }] } I0117 00:20:02.918108 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" }] }] } I0117 00:20:02.918258 39591 executor.go:111] Tasks: 103 done / 123 total; 5 can run I0117 00:20:02.918326 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:02.918369 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0117 00:20:02.918336 39591 api.go:53] PageSize not implemented I0117 00:20:02.918408 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:02.918475 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } W0117 00:20:02.918561 39591 api.go:53] PageSize not implemented I0117 00:20:02.918516 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:02.918605 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:02.922854 39591 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0117 00:20:02.923001 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.923092 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.923156 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.923260 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.923660 39591 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0117 00:20:02.923860 39591 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0117 00:20:02.924083 39591 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0117 00:20:02.924157 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:02.924188 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:02.924246 39591 dns.go:235] Pre-creating DNS records I0117 00:20:02.924267 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:02.929256 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:02.932225 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.932295 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:02.932338 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.547951 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:03.694939 39591 iamrole.go:89] ListRoles: { } I0117 00:20:03.696344 39591 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0117 00:20:03.696589 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.696759 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:03.696835 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:03.696971 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:03.697062 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:03.697087 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:03.697830 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.699157 39591 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0117 00:20:03.699302 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0117 00:20:03.699385 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0117 00:20:03.699440 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0117 00:20:03.699434 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0117 00:20:03.699531 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0117 00:20:03.699606 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:03.699620 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0117 00:20:03.699655 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0117 00:20:03.699722 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0117 00:20:03.699794 39591 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0117 00:20:03.699767 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0117 00:20:03.699873 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:03.699912 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:03.699988 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0117 00:20:03.700105 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:03.700181 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0117 00:20:03.700277 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:03.700990 39591 executor.go:111] Tasks: 72 done / 123 total; 31 can run W0117 00:20:03.701198 39591 api.go:53] PageSize not implemented I0117 00:20:03.701222 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.701299 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.701328 39591 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0117 00:20:03.701338 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.701360 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:03.701441 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:03.701437 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.701458 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0117 00:20:03.701505 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0117 00:20:03.701534 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0117 00:20:03.701598 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0117 00:20:03.701628 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } W0117 00:20:03.701689 39591 api.go:53] PageSize not implemented I0117 00:20:03.701704 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.701759 39591 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0117 00:20:03.701814 39591 api.go:53] PageSize not implemented I0117 00:20:03.701850 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.701861 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:03.701967 39591 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" W0117 00:20:03.701991 39591 api.go:53] PageSize not implemented I0117 00:20:03.701994 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:03.702052 39591 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0117 00:20:03.702054 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.702261 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.702378 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.706183 39591 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0117 00:20:03.706270 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.706384 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.706498 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.706656 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.707237 39591 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0117 00:20:03.707328 39591 api.go:53] PageSize not implemented I0117 00:20:03.707344 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.707508 39591 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0117 00:20:03.707725 39591 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0117 00:20:03.710439 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:20:03.710494 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:20:03.710521 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:03.710543 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:20:03.710564 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:20:03.710585 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:20:03.710617 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:20:03.710646 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:20:03.710675 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0117 00:20:03.710702 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:20:03.710722 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:20:03.710744 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:20:03.710764 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:03.710790 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:03.710813 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:20:03.710835 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:20:03.710857 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:03.710882 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:03.710905 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:20:03.710940 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:03.710968 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:03.710991 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:20:03.712321 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:20:03.712377 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:20:03.712392 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:20:03.712422 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712467 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0117 00:20:03.712517 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712564 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712595 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712626 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712658 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712684 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0117 00:20:03.712717 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712749 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0117 00:20:03.712774 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0117 00:20:03.712808 39591 api.go:53] PageSize not implemented I0117 00:20:03.712819 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0117 00:20:03.712848 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:03.712867 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:03.712879 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0117 00:20:03.712907 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:20:03.712925 39591 targetgroups.go:35] PageSize not implemented I0117 00:20:03.712936 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" ] } I0117 00:20:03.712983 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:20:03.713019 39591 iamrole.go:89] ListRoles: { } I0117 00:20:03.713056 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:03.713076 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:03.713127 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:20:03.713162 39591 routetable.go:53] DescribeRouteTables: { } autoscaling-config:lt-2 ok autoscaling-group:nodes.private-shared-subnet.example.com ok I0117 00:20:03.713647 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:03.713670 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0117 00:20:03.713738 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok iam-instance-profile:bastions.private-shared-subnet.example.com ok I0117 00:20:03.713766 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0117 00:20:03.713762 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0117 00:20:03.713805 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0117 00:20:03.713699 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0117 00:20:03.713859 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:bastion.private-shared-subnet.example.com ok I0117 00:20:03.713857 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0117 00:20:03.713882 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } I0117 00:20:03.713892 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } security-group:sg-2 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok I0117 00:20:03.713843 39591 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } load-balancer:api-private-shared-subnet-n2f8ak ok iam-instance-profile:nodes.private-shared-subnet.example.com ok I0117 00:20:03.713913 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } iam-instance-profile:masters.private-shared-subnet.example.com ok keypair:key-1 ok autoscaling-config:lt-3 ok I0117 00:20:03.713973 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:03.713822 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.private-shared-subnet.example.com ok I0117 00:20:03.713998 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok I0117 00:20:03.714015 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0117 00:20:03.714192 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:03.714212 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:20:03.714249 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0117 00:20:03.714288 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:03.714327 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0117 00:20:03.714413 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:03.714425 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok autoscaling-config:lt-1 ok I0117 00:20:03.714461 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:20:03.714529 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:03.714558 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0117 00:20:03.714562 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } I0117 00:20:03.714635 39591 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com W0117 00:20:03.714637 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:03.714664 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } I0117 00:20:03.714655 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } security-group:sg-3 ok I0117 00:20:03.714697 39591 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0117 00:20:03.714710 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0117 00:20:03.714737 39591 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok I0117 00:20:03.714773 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0117 00:20:03.714809 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0117 00:20:03.714822 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0117 00:20:03.714843 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0117 00:20:03.714864 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0117 00:20:03.714886 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (1.54s) === RUN TestLifecyclePrivateSharedIP I0117 00:20:03.715296 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:20:03.715416 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:20:03.715446 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:20:03.715478 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:20:03.715507 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:20:03.715576 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:20:03.715616 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:20:03.715639 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:20:03.715668 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:20:03.715690 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0117 00:20:03.737995 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:03.740840 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.740903 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:03.740968 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.305745 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:04.451632 39591 iamrole.go:89] ListRoles: { } I0117 00:20:04.453043 39591 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0117 00:20:04.453353 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0117 00:20:04.453459 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0117 00:20:04.453435 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.453697 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:04.453872 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:04.454179 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:04.454325 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.454363 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0117 00:20:04.454482 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:04.454502 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0117 00:20:04.454593 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:04.454634 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:04.455233 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0117 00:20:04.455312 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0117 00:20:04.455335 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.455508 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:04.455626 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:04.455742 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:04.456841 39591 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0117 00:20:04.456995 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0117 00:20:04.457035 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0117 00:20:04.457020 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.457161 39591 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0117 00:20:04.457128 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0117 00:20:04.457210 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0117 00:20:04.457242 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0117 00:20:04.457229 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0117 00:20:04.457254 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.457315 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0117 00:20:04.457354 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:20:04.457386 39591 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0117 00:20:04.457443 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0117 00:20:04.457480 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0117 00:20:04.457449 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0117 00:20:04.457425 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.457481 39591 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0117 00:20:04.457545 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0117 00:20:04.457597 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-12345678" } I0117 00:20:04.457623 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:04.457708 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:04.457750 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:04.457781 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0117 00:20:04.457941 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:04.458013 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:04.458047 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:04.458076 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:04.458171 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0117 00:20:04.458255 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-12345678" } I0117 00:20:04.458250 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0117 00:20:04.458422 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:04.458499 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:04.458574 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0117 00:20:04.458694 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:20:04.458745 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:20:04.458777 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:20:04.458840 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:04.458871 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:20:04.458906 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:20:04.458936 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:20:04.458970 39591 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0117 00:20:04.459030 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:20:04.459070 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0117 00:20:04.458973 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0117 00:20:04.459157 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0117 00:20:04.459297 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:20:04.459349 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:04.459421 39591 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0117 00:20:04.459583 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } W0117 00:20:04.459726 39591 api.go:53] PageSize not implemented I0117 00:20:04.459724 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0117 00:20:04.459779 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:04.459851 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:04.459829 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:04.459840 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.459902 39591 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "Name", Value: "api.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0117 00:20:04.459954 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:04.459938 39591 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-2" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], Type: "network" } I0117 00:20:04.459981 39591 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0117 00:20:04.460028 39591 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0117 00:20:04.460002 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.460131 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:20:04.460185 39591 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0117 00:20:04.460254 39591 api.go:53] PageSize not implemented I0117 00:20:04.460271 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:04.460317 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.460500 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0117 00:20:04.460619 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:04.460727 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0117 00:20:04.460774 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:04.460848 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:04.460903 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0117 00:20:04.460973 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0117 00:20:04.461200 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0117 00:20:04.461318 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:04.461390 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:20:04.461477 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.461594 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0117 00:20:04.461707 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.461806 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.461910 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0117 00:20:04.461956 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.462072 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.462212 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.462305 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.462386 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" }] }] } I0117 00:20:04.462545 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.462667 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:04.462783 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:04.462816 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0117 00:20:04.462927 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0117 00:20:04.463005 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" }] }] } I0117 00:20:04.463138 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:20:04.463177 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.463289 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.463397 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0117 00:20:04.463430 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.463537 39591 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0117 00:20:04.463583 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0117 00:20:04.463622 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] }] } I0117 00:20:04.463699 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0117 00:20:04.463756 39591 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0117 00:20:04.463816 39591 api.go:53] PageSize not implemented I0117 00:20:04.463827 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0117 00:20:04.463841 39591 api.go:53] PageSize not implemented I0117 00:20:04.463889 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:04.463885 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:04.463908 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:04.463974 39591 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:20:04.464020 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:04.464056 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:04.464083 39591 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-2", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0117 00:20:04.464095 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:04.464177 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:20:04.464211 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:20:04.464244 39591 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0117 00:20:04.468110 39591 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0117 00:20:04.468245 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:04.468367 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0117 00:20:04.468471 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.468558 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.468696 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.468784 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.469220 39591 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0117 00:20:04.469414 39591 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0117 00:20:04.469636 39591 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0117 00:20:04.469684 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:04.469714 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:04.469775 39591 dns.go:235] Pre-creating DNS records I0117 00:20:04.469801 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:04.474804 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:04.477644 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.477712 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:04.477756 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.040733 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:05.185356 39591 iamrole.go:89] ListRoles: { } I0117 00:20:05.186850 39591 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0117 00:20:05.187105 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.187429 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0117 00:20:05.187529 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0117 00:20:05.187557 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0117 00:20:05.187594 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:05.187822 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.188053 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:05.189871 39591 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0117 00:20:05.189997 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0117 00:20:05.190126 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0117 00:20:05.190166 39591 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0117 00:20:05.190175 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:05.190165 39591 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0117 00:20:05.190235 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0117 00:20:05.190264 39591 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0117 00:20:05.190226 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0117 00:20:05.190309 39591 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0117 00:20:05.190357 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:05.190404 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0117 00:20:05.190486 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] }] } I0117 00:20:05.190596 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:20:05.190627 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0117 00:20:05.190738 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:05.190774 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.190870 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0117 00:20:05.190897 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0117 00:20:05.190996 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:05.191043 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.191158 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.191582 39591 executor.go:111] Tasks: 74 done / 132 total; 36 can run W0117 00:20:05.191764 39591 api.go:53] PageSize not implemented I0117 00:20:05.191780 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0117 00:20:05.191795 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.191863 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:05.191883 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.191916 39591 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0117 00:20:05.191959 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:05.192019 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:05.192093 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:05.192111 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0117 00:20:05.192162 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0117 00:20:05.192194 39591 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0117 00:20:05.192224 39591 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0117 00:20:05.192252 39591 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } W0117 00:20:05.192319 39591 api.go:53] PageSize not implemented I0117 00:20:05.192337 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.192340 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:05.192454 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:05.192548 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:05.192635 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.192814 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.192957 39591 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0117 00:20:05.193021 39591 api.go:53] PageSize not implemented I0117 00:20:05.193029 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:05.193066 39591 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0117 00:20:05.193060 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.193058 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:05.193159 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:20:05.193154 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0117 00:20:05.193232 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.193273 39591 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0117 00:20:05.193315 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } W0117 00:20:05.193438 39591 api.go:53] PageSize not implemented I0117 00:20:05.193491 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.197927 39591 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0117 00:20:05.198134 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0117 00:20:05.198215 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.198327 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.198388 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.198520 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.198890 39591 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0117 00:20:05.198965 39591 api.go:53] PageSize not implemented I0117 00:20:05.198981 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.199147 39591 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0117 00:20:05.199295 39591 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0117 00:20:05.201956 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:20:05.202015 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:20:05.202066 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:05.202125 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:20:05.202176 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:20:05.202223 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:20:05.202273 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:20:05.202320 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:20:05.202370 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0117 00:20:05.202431 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0117 00:20:05.202481 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:20:05.202524 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:20:05.202571 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:20:05.202618 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:20:05.202657 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0117 00:20:05.202702 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:05.202746 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:05.202790 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0117 00:20:05.202835 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0117 00:20:05.202878 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:20:05.202924 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:05.202963 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0117 00:20:05.203013 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:05.203049 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:20:05.203090 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:05.203157 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:05.203207 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:20:05.204443 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:20:05.204523 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:20:05.204550 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:20:05.204604 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.204676 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0117 00:20:05.204759 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.204828 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.204875 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.204930 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.204986 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.205041 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0117 00:20:05.205111 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.205202 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:20:05.205242 39591 natgateway.go:117] DescribeNatGateways: { } I0117 00:20:05.205295 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0117 00:20:05.205332 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0117 00:20:05.205393 39591 api.go:53] PageSize not implemented I0117 00:20:05.205415 39591 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0117 00:20:05.205466 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:05.205496 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:05.205517 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0117 00:20:05.205568 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:20:05.205599 39591 targetgroups.go:35] PageSize not implemented I0117 00:20:05.205621 39591 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" ] } I0117 00:20:05.205685 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:20:05.205735 39591 iamrole.go:89] ListRoles: { } I0117 00:20:05.205792 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:05.205821 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:05.205880 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:20:05.205941 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:20:05.205983 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0117 00:20:05.206032 39591 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0117 00:20:05.206079 39591 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } autoscaling-config:lt-1 ok autoscaling-config:lt-3 ok autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok I0117 00:20:05.206627 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } autoscaling-group:bastion.private-shared-ip.example.com ok I0117 00:20:05.206696 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } iam-instance-profile:nodes.private-shared-ip.example.com ok I0117 00:20:05.206644 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:05.206728 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0117 00:20:05.206765 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } iam-instance-profile:masters.private-shared-ip.example.com ok I0117 00:20:05.206794 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0117 00:20:05.206785 39591 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0117 00:20:05.206831 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } load-balancer:api-private-shared-ip-exa-ohatqj ok I0117 00:20:05.206742 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } iam-instance-profile:bastions.private-shared-ip.example.com ok W0117 00:20:05.206866 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:05.206889 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } I0117 00:20:05.206650 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } volume:vol-1 ok route53-record:Z1AFAKE1ZON3YO/AAAA/api.private-shared-ip.example.com ok autoscaling-config:lt-2 ok autoscaling-group:nodes.private-shared-ip.example.com ok I0117 00:20:05.206954 39591 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok I0117 00:20:05.206958 39591 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0117 00:20:05.207025 39591 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok I0117 00:20:05.207048 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:05.207098 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } W0117 00:20:05.207254 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:05.207276 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:20:05.207315 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:20:05.207355 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0117 00:20:05.207384 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0117 00:20:05.207426 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0117 00:20:05.207582 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:05.207600 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0117 00:20:05.207635 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0117 00:20:05.207771 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0117 00:20:05.207787 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0117 00:20:05.207838 39591 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0117 00:20:05.207850 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0117 00:20:05.207888 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0117 00:20:05.207819 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 },{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }] } W0117 00:20:05.207925 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:05.207936 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0117 00:20:05.207916 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0117 00:20:05.207982 39591 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0117 00:20:05.207976 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:20:05.207996 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0117 00:20:05.208027 39591 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0117 00:20:05.208018 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0117 00:20:05.208048 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0117 00:20:05.208081 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0117 00:20:05.208092 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0117 00:20:05.208111 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok I0117 00:20:05.208209 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:20:05.208263 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok --- PASS: TestLifecyclePrivateSharedIP (1.49s) === RUN TestLifecycleManyAddons I0117 00:20:05.208674 39591 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:20:05.208793 39591 internetgateways.go:66] CreateInternetGateway: { } I0117 00:20:05.208822 39591 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:20:05.208855 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:20:05.208885 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:20:05.208923 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:20:05.208959 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:20:05.208981 39591 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:20:05.209008 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:20:05.209031 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0117 00:20:05.229856 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:05.234295 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.234411 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:05.797318 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:06.452747 39591 iamrole.go:89] ListRoles: { } I0117 00:20:06.453506 39591 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0117 00:20:06.454346 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.454550 39591 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0117 00:20:06.454658 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:20:06.454709 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] }] } I0117 00:20:06.454727 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0117 00:20:06.454818 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0117 00:20:06.454847 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:06.454966 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:06.455246 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.455406 39591 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.455485 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0117 00:20:06.455516 39591 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0117 00:20:06.455544 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:20:06.457026 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.457268 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:06.457348 39591 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0117 00:20:06.457525 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:06.461103 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:06.461325 39591 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0117 00:20:06.461421 39591 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0117 00:20:06.461442 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:06.461585 39591 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.463254 39591 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0117 00:20:06.463485 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:20:06.463458 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.463532 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:20:06.463565 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:06.463682 39591 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:20:06.463694 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:20:06.463732 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.463854 39591 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:20:06.463872 39591 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" } ] }], VpcId: "vpc-1" } I0117 00:20:06.463891 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0117 00:20:06.464151 39591 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:20:06.464141 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:20:06.464231 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:20:06.464279 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:06.464417 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0117 00:20:06.464497 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:06.464542 39591 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0117 00:20:06.464642 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:20:06.464695 39591 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] } I0117 00:20:06.464784 39591 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0117 00:20:06.464884 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:20:06.464933 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:20:06.464970 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:20:06.465048 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:06.465085 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:06.465137 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0117 00:20:06.465303 39591 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0117 00:20:06.465364 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:06.465400 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:06.465660 39591 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:20:06.468401 39591 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0117 00:20:06.468586 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.468790 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" }] }] } I0117 00:20:06.468932 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.469097 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.469286 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" }] }] } I0117 00:20:06.469392 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:20:06.469541 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:20:06.469685 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.469800 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:06.469861 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:06.469912 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:06.469961 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.470067 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.470184 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:06.470282 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:06.470358 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0117 00:20:06.470516 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0117 00:20:06.470647 39591 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:20:06.470706 39591 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:20:06.470830 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:06.470912 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:06.470995 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0117 00:20:06.471138 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0117 00:20:06.471177 39591 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0117 00:20:06.471207 39591 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0117 00:20:06.471240 39591 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0117 00:20:06.471399 39591 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0117 00:20:06.471596 39591 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0117 00:20:06.471803 39591 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0117 00:20:06.471840 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:06.471883 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:06.471939 39591 dns.go:235] Pre-creating DNS records I0117 00:20:06.471963 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:06.476845 39591 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0117 00:20:06.479710 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:06.479775 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:07.046216 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:07.726711 39591 iamrole.go:89] ListRoles: { } I0117 00:20:07.727491 39591 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0117 00:20:07.727932 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] }] } I0117 00:20:07.728032 39591 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0117 00:20:07.728224 39591 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0117 00:20:07.728320 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.728905 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.729066 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.729159 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:20:07.729181 39591 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:20:07.729216 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:07.730559 39591 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0117 00:20:07.730680 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.730772 39591 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:20:07.730804 39591 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:20:07.730804 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.730916 39591 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:20:07.730955 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0117 00:20:07.731083 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0117 00:20:07.731159 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.731315 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0117 00:20:07.731460 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:07.731523 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:07.731636 39591 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:20:07.733624 39591 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0117 00:20:07.733799 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:07.733887 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:07.734043 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:07.734243 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:07.734405 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:07.734528 39591 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0117 00:20:07.734656 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:07.734866 39591 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0117 00:20:07.735062 39591 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0117 00:20:07.735211 39591 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0117 00:20:07.737539 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0117 00:20:07.737588 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0117 00:20:07.737617 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0117 00:20:07.737642 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0117 00:20:07.737665 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0117 00:20:07.737688 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0117 00:20:07.737715 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0117 00:20:07.737740 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0117 00:20:07.737765 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0117 00:20:07.737789 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0117 00:20:07.737818 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0117 00:20:07.737842 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0117 00:20:07.737869 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0117 00:20:07.737896 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0117 00:20:07.737918 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:20:07.737940 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0117 00:20:07.737964 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:20:07.737989 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0117 00:20:07.738015 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0117 00:20:07.738035 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0117 00:20:07.738055 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0117 00:20:07.738082 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0117 00:20:07.738107 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:20:07.738148 39591 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0117 00:20:07.739444 39591 delete_cluster.go:128] Looking for cloud resources to delete W0117 00:20:07.739495 39591 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0117 00:20:07.739510 39591 keypairs.go:95] DescribeKeyPairs: { } I0117 00:20:07.739545 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739582 39591 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0117 00:20:07.739624 39591 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739668 39591 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739703 39591 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739745 39591 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739778 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739807 39591 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0117 00:20:07.739844 39591 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739885 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0117 00:20:07.739914 39591 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0117 00:20:07.739948 39591 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0117 00:20:07.739977 39591 api.go:53] PageSize not implemented I0117 00:20:07.739996 39591 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0117 00:20:07.740019 39591 loadbalancers.go:35] PageSize not implemented I0117 00:20:07.740035 39591 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0117 00:20:07.740056 39591 targetgroups.go:35] PageSize not implemented I0117 00:20:07.740072 39591 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0117 00:20:07.740110 39591 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0117 00:20:07.740168 39591 iamrole.go:89] ListRoles: { } I0117 00:20:07.740204 39591 zones.go:93] ListHostedZonesPages { } I0117 00:20:07.740226 39591 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0117 00:20:07.740260 39591 internetgateways.go:101] DescribeInternetGateways: { } I0117 00:20:07.740300 39591 routetable.go:53] DescribeRouteTables: { } I0117 00:20:07.740327 39591 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0117 00:20:07.740660 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0117 00:20:07.740723 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } autoscaling-group:nodes.minimal.example.com ok I0117 00:20:07.740738 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:20:07.740782 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0117 00:20:07.740764 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0117 00:20:07.740714 39591 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok W0117 00:20:07.740875 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:07.740918 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-1 ok I0117 00:20:07.740910 39591 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:20:07.740967 39591 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok I0117 00:20:07.740996 39591 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0117 00:20:07.741020 39591 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0117 00:20:07.741064 39591 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0117 00:20:07.741084 39591 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0117 00:20:07.741111 39591 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0117 00:20:07.741260 39591 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0117 00:20:07.741278 39591 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0117 00:20:07.741302 39591 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0117 00:20:07.741379 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0117 00:20:07.741414 39591 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0117 00:20:07.741425 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0117 00:20:07.741447 39591 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0117 00:20:07.741412 39591 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0117 00:20:07.741468 39591 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0117 00:20:07.741495 39591 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0117 00:20:07.741504 39591 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0117 00:20:07.741521 39591 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0117 00:20:07.741564 39591 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0117 00:20:07.741620 39591 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0117 00:20:07.741673 39591 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (2.53s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 115.075s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.004s ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0117 00:18:13.231888 39867 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.005s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.004s === RUN TestPodController I0117 00:18:13.251415 39868 pod.go:59] starting pod controller I0117 00:18:13.251579 39868 stoppable.go:62] shutting down controller I0117 00:18:13.251631 39868 pod.go:107] Got stop signal --- PASS: TestPodController (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/watchers 0.026s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.004s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037600} route53_test.go:93: Got zone list: [0xc000037620] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c29b8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000376e0} route53_test.go:93: Got zone list: [0xc000037700] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c29c8} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc0000377b0} route53_test.go:170: Successfully added managed DNS zone: &{0xc00040a270 0xc0000c29e0} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000378e0} route53_test.go:93: Got zone list: [0xc000037900] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c29f8} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000379d0} route53_test.go:93: Got zone list: [0xc0000379f0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2a18} route53_test.go:187: Successfully added resource record set: {0xc0003e7d40 0xc0000c2a38} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037c40} route53_test.go:93: Got zone list: [0xc000037c60] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2ac0} route53_test.go:199: Successfully added resource record set: {0xc0003e7ef0 0xc0000c2ae0} route53_test.go:118: Got 1 recordsets: [0xc000037dc0] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000037ee0} route53_test.go:93: Got zone list: [0xc000037f00] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2b78} route53_test.go:221: Successfully added resource record set: {0xc000412120 0xc0000c2b98} route53_test.go:228: Correctly failed to add duplicate resource record {0xc000412120 0xc0000c2b98}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041e290} route53_test.go:93: Got zone list: [0xc00041e2b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2c50} route53_test.go:246: Successfully removed resource set {0xc000412360 0xc0000c2c70} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041e500} route53_test.go:93: Got zone list: [0xc00041e520] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2cf8} route53_test.go:264: Successfully removed resource set {0xc000412510 0xc0000c2d18} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041e780} route53_test.go:93: Got zone list: [0xc00041e7a0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2da8} commontests.go:192: Successfully added resource record set: {0xc0004126c0 0xc0000c2dc8} commontests.go:45: Correctly replaced resource record {0xc0004126c0 0xc0000c2dc8} -> {0xc0004127e0 0xc0000c2e18} commontests.go:142: Got 1 recordsets: [0xc00041ea50] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041ec10} route53_test.go:93: Got zone list: [0xc00041ec30] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2ec8} commontests.go:192: Successfully added resource record set: {0xc000412ab0 0xc0000c2ee8} commontests.go:70: Correctly replaced resource record {0xc000412ab0 0xc0000c2ee8} -> {0xc000412bd0 0xc0000c2f38} commontests.go:142: Got 1 recordsets: [0xc00041eee0] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041f0d0} route53_test.go:93: Got zone list: [0xc00041f0f0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c2ff8} commontests.go:192: Successfully added resource record set: {0xc000412ea0 0xc0000c3018} commontests.go:142: Got 2 recordsets: [0xc00041f320 0xc00041f340] commontests.go:142: Got 2 recordsets: [0xc00041f390 0xc00041f3b0] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc00041f540} route53_test.go:93: Got zone list: [0xc00041f560] route53_test.go:98: Got at least 1 zone in list:&{0xc0003e1e00 0xc0000c3118} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.010s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.006s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5000} clouddns_test.go:71: Got zone list: [0xc000400a68] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000400a38} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5040} clouddns_test.go:71: Got zone list: [0xc000400b88] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000400b58} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5080} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc0005abe00 0xc000400cc0} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a50c0} clouddns_test.go:71: Got zone list: [0xc000400dc8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000400d98} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5100} clouddns_test.go:71: Got zone list: [0xc000400f78] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000400f48} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5160} clouddns_test.go:71: Got zone list: [0xc000401158] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000401128} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a51c0} clouddns_test.go:71: Got zone list: [0xc0004013f8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc0004013c8} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5220} clouddns_test.go:71: Got zone list: [0xc000401620] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc0004015f0} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5280} clouddns_test.go:71: Got zone list: [0xc000401800] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc0004017d0} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a52e0} clouddns_test.go:71: Got zone list: [0xc000401a58] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000401a28} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5320} clouddns_test.go:71: Got zone list: [0xc000401dd0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000401da0} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5360} clouddns_test.go:71: Got zone list: [0xc000438240] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000438210} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc0000df738 0xc0005a5420} clouddns_test.go:71: Got zone list: [0xc0004386c0] clouddns_test.go:76: Got at least 1 zone in list:&{0xc0005abc80 0xc000438690} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.040s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.021s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.006s ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.052s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0117 00:18:18.007413 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.007532 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.007567 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.007596 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.007618 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.007656 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.007685 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.007694 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.007718 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.007735 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.012659 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0117 00:18:18.015010 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.015096 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.015129 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.015157 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.015171 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.015194 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.015217 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.015228 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.015242 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.015253 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.016093 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.00s) === RUN TestContainerdBuilder_Simple I0117 00:18:18.019248 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.019318 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.019346 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.019373 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.019391 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.019430 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.019458 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.019470 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.019493 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.019509 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.020260 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.021495 40472 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0117 00:18:18.021506 40472 assetstore.go:111] bin/containerd I0117 00:18:18.021510 40472 assetstore.go:111] bin/containerd-shim I0117 00:18:18.021513 40472 assetstore.go:111] bin/containerd-shim-runc-v1 I0117 00:18:18.021516 40472 assetstore.go:111] bin/containerd-shim-runc-v2 I0117 00:18:18.021519 40472 assetstore.go:111] bin/containerd-stress I0117 00:18:18.021522 40472 assetstore.go:111] bin/ctr I0117 00:18:18.021545 40472 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0117 00:18:18.021552 40472 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.00s) === RUN TestContainerdBuilder_Flatcar I0117 00:18:18.023285 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.023343 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.023360 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.023380 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.023393 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.023412 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.023428 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.023437 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.023450 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.023461 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.024326 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.025771 40472 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0117 00:18:18.028403 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.028834 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.028872 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.028919 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.028945 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.028976 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.029006 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.029023 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.029047 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.029065 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.030273 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.031826 40472 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0117 00:18:18.032236 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.032294 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.032310 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.032329 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.032342 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.032360 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.032377 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.032385 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.032398 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.032408 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.033022 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.033976 40472 assetstore.go:108] Matching assets for "^docker/": I0117 00:18:18.033985 40472 assetstore.go:111] docker/containerd I0117 00:18:18.033990 40472 assetstore.go:111] docker/containerd-shim I0117 00:18:18.033993 40472 assetstore.go:111] docker/ctr I0117 00:18:18.034001 40472 assetstore.go:111] docker/docker I0117 00:18:18.034005 40472 assetstore.go:111] docker/docker-init I0117 00:18:18.034008 40472 assetstore.go:111] docker/docker-proxy I0117 00:18:18.034011 40472 assetstore.go:111] docker/dockerd I0117 00:18:18.034013 40472 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.00s) === RUN TestDockerBuilder_LogFlags I0117 00:18:18.035607 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.035662 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.035676 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.035694 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.035706 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.035731 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.035746 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.035755 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.035769 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.035779 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.036367 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.037283 40472 assetstore.go:108] Matching assets for "^docker/": I0117 00:18:18.037294 40472 assetstore.go:111] docker/containerd I0117 00:18:18.037298 40472 assetstore.go:111] docker/containerd-shim I0117 00:18:18.037301 40472 assetstore.go:111] docker/ctr I0117 00:18:18.037303 40472 assetstore.go:111] docker/docker I0117 00:18:18.037306 40472 assetstore.go:111] docker/docker-init I0117 00:18:18.037308 40472 assetstore.go:111] docker/docker-proxy I0117 00:18:18.037311 40472 assetstore.go:111] docker/dockerd I0117 00:18:18.037313 40472 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.00s) === RUN TestDockerBuilder_SkipInstall I0117 00:18:18.038777 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.038828 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.038842 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.038859 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.038872 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.038889 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.038902 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.038910 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.038922 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.038932 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.039495 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.040417 40472 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0117 00:18:18.040500 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.040544 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.040555 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.040569 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.040581 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.040594 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.040606 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.040615 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.040632 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.040640 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.041231 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:18.042201 40472 assetstore.go:108] Matching assets for "^docker/": I0117 00:18:18.042212 40472 assetstore.go:111] docker/docker I0117 00:18:18.042216 40472 assetstore.go:111] docker/docker-containerd I0117 00:18:18.042219 40472 assetstore.go:111] docker/docker-containerd-ctr I0117 00:18:18.042222 40472 assetstore.go:111] docker/docker-containerd-shim I0117 00:18:18.042225 40472 assetstore.go:111] docker/docker-init I0117 00:18:18.042227 40472 assetstore.go:111] docker/docker-proxy I0117 00:18:18.042230 40472 assetstore.go:111] docker/docker-runc I0117 00:18:18.042232 40472 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.00s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0117 00:18:18.044322 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.044372 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.044386 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.044400 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.044412 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.044426 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.044440 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.044448 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.044460 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.044470 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.045804 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.00s) === RUN TestDockerHooksBuilder I0117 00:18:18.047161 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.047233 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.047254 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.047280 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.047299 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.047324 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.047346 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.047361 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.047382 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.047395 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.048453 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0117 00:18:18.049734 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.049782 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.049796 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.049811 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.049821 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.049836 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.049850 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.049858 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.049870 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.049879 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.050779 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.00s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0117 00:18:18.056188 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.056291 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.056319 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.056350 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.056374 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.056403 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.056430 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.056446 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.056468 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.056484 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.058292 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.01s) === RUN TestAuditConfigAPIServerBuilder I0117 00:18:18.067221 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.067325 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.067354 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.067383 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.067404 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.067435 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.067462 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.067477 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.067502 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.067517 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.069726 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0117 00:18:18.074368 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.074429 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.074445 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.074463 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.074483 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.074501 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.074517 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.074525 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.074539 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.074549 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.075629 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0117 00:18:18.081723 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.081790 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.081808 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.081828 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.081842 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.081861 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.081877 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.081885 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.081898 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.081909 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.082980 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0117 00:18:18.088002 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.088091 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.088123 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.088153 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.088174 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.088209 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.088233 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.088246 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.088265 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.088279 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.089592 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0117 00:18:18.093366 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.093426 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.093442 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.093460 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.093473 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.093489 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.093506 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.093516 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.093531 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.093541 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.094527 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0117 00:18:18.100809 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:18.100917 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:18.100944 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:18.100972 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:18.100993 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:18.101020 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:18.101044 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:18.101057 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:18.101079 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:18.101095 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:18.102652 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.62s) === RUN TestKubeAPIServerBuilderARM64 I0117 00:18:19.715948 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:19.716038 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:19.716062 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:19.716091 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:19.716111 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:19.716150 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:19.716178 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:19.716193 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:19.716213 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:19.716228 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:19.717779 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.19s) === RUN TestKubeControllerManagerBuilder I0117 00:18:20.904709 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:20.904823 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:20.904854 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:20.904892 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:20.904920 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:20.904961 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:20.904995 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:20.905015 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:20.905041 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:20.905066 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:20.907296 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0117 00:18:20.914695 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:20.914774 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:20.914794 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:20.914822 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:20.914842 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:20.914867 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:20.914888 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:20.914901 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:20.914920 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:20.914933 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:20.916472 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.20s) === RUN TestKubeControllerManagerBuilderARM64 I0117 00:18:22.118625 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:22.118735 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:22.119427 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:22.119510 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:22.119551 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:22.119596 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:22.119633 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:22.119659 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:22.119695 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:22.119722 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:22.122030 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.19s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0117 00:18:23.311936 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:23.312051 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:23.312079 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:23.312131 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:23.312159 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:23.312195 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:23.312226 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:23.312245 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:23.312269 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:23.312288 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:23.314493 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0117 00:18:23.319335 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:23.319442 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:23.319471 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:23.319501 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:23.319529 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:23.319562 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:23.319588 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:23.319610 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:23.319635 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:23.319656 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:23.321750 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.18s) === RUN TestKubeProxyBuilderARM64 I0117 00:18:24.503722 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:24.503840 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:24.503874 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:24.503912 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:24.503939 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:24.503977 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:24.504007 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:24.504029 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:24.504057 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:24.504076 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:24.506240 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.19s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0117 00:18:25.693951 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:25.694073 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:25.694109 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:25.694164 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:25.694193 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:25.694227 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:25.694257 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:25.694279 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:25.694307 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:25.694327 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:25.696435 40472 zones.go:93] ListHostedZonesPages { } W0117 00:18:25.699721 40472 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0117 00:18:25.704104 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:25.704228 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:25.704259 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:25.704293 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:25.704319 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:25.704350 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:25.704377 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:25.704399 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:25.704424 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:25.704443 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:25.706530 40472 zones.go:93] ListHostedZonesPages { } W0117 00:18:26.922280 40472 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.22s) === RUN TestKubeSchedulerBuilderARM64 I0117 00:18:26.924603 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:26.924719 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:26.924752 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:26.924797 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:26.924826 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:26.924868 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:26.924900 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:26.924920 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:26.924949 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:26.924970 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:26.927073 40472 zones.go:93] ListHostedZonesPages { } W0117 00:18:28.111246 40472 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.19s) === RUN TestKubectlBuilder I0117 00:18:28.113547 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.113675 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.113710 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.113752 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.113782 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.113823 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.113856 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.113875 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.113906 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.113930 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.116579 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:28.119099 40472 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0117 00:18:28.121660 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.121746 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.121796 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.121828 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.121857 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.121886 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.121912 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.121931 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.121960 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.121979 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.123713 40472 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.01s) === RUN Test_RunKubeletBuilderWarmPool I0117 00:18:28.129589 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.129670 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.129716 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.129745 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.129771 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.129801 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.129827 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.129845 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.129869 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.129888 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.131494 40472 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.01s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0117 00:18:28.135960 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.136059 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.136087 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.136132 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.136165 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.136196 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.136221 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.136240 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.136268 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.136287 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.138404 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:28.140769 40472 assetstore.go:108] Matching assets for "protokube$": I0117 00:18:28.140796 40472 assetstore.go:111] /opt/kops/bin/protokube I0117 00:18:28.140809 40472 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0117 00:18:28.140833 40472 assetstore.go:108] Matching assets for "channels$": I0117 00:18:28.140844 40472 assetstore.go:111] /opt/kops/bin/channels I0117 00:18:28.140853 40472 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.01s) === RUN TestSecretBuilder I0117 00:18:28.145021 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.145169 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.145206 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.145258 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.145302 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.145361 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.145401 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.145443 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.145489 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.145521 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.147529 40472 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.01s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0117 00:18:28.150519 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.150637 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.150672 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.150719 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.150763 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.150819 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.150861 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.150905 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.150952 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.150982 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.152925 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:28.155321 40472 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.01s) === RUN TestUpdateServiceBuilderExternal I0117 00:18:28.155836 40472 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:28.155952 40472 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:28.155991 40472 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:28.156039 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:28.156082 40472 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:28.156165 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:28.156206 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:28.156244 40472 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:28.156288 40472 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:28.156319 40472 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:28.158337 40472 zones.go:93] ListHostedZonesPages { } I0117 00:18:28.160704 40472 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.01s) PASS ok k8s.io/kops/nodeup/pkg/model 10.225s ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.032s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.026s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.031s ? k8s.io/kops/pkg/apis/kops/registry [no test files] === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0117 00:18:17.953165 40476 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0117 00:18:17.953236 40476 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.009s ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0117 00:18:18.001127 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001219 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001244 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001262 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001279 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0117 00:18:18.001447 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001481 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001498 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001513 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001538 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001555 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001573 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001588 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001605 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001623 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001637 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001655 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001669 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001684 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001697 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001724 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001739 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001754 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0117 00:18:18.001767 40477 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0117 00:18:18.001892 40477 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0117 00:18:18.001954 40477 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.067s ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.012s ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0117 00:18:17.980979 40479 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0117 00:18:17.981796 40479 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0117 00:18:17.982613 40479 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0117 00:18:17.983616 40479 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0117 00:18:17.984853 40479 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.00s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0117 00:18:17.985503 40479 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host W0117 00:18:17.985950 40479 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.32.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0117 00:18:17.986542 40479 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0117 00:18:17.986552 40479 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0117 00:18:17.986559 40479 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0117 00:18:17.986565 40479 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.042s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.005s ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.058s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.027s ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.00s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.073s ? k8s.io/kops/pkg/commands/commandutils [no test files] === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.068s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.018s ? k8s.io/kops/pkg/configserver [no test files] === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.003s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.003s ? k8s.io/kops/pkg/dump [no test files] === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.01s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.029s === RUN TestFlagToFalse I0117 00:18:18.370930 41283 featureflag_test.go:32] Created flag Unittest1 I0117 00:18:18.370956 41283 featureflag.go:164] FeatureFlag "UnitTest1"=false I0117 00:18:18.370961 41283 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0117 00:18:18.371001 41283 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.003s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.023s === RUN TestRenderInstanceGroupZones W0117 00:18:18.383246 41285 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.016s === RUN TestWarmPoolOnlyRoll I0117 00:18:30.599203 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.599282 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.599299 42341 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0117 00:18:30.599653 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.599676 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.600835 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.600870 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.606042 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.606094 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.606109 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.606131 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.607743 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.608187 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.608280 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.608304 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.609434 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.609458 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.614633 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.614669 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.615048 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.615082 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.615096 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.616232 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.616271 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.621693 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.621723 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.621731 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.621736 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.622159 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.622468 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.622484 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.623599 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.623622 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.628827 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.628864 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.629295 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.629320 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.630412 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.630426 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.635635 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.635690 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.636311 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.636335 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.637442 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.637464 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.642667 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.642699 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.642713 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.642722 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:30.643426 42341 instancegroups.go:431] Draining the node: "node-2a.local". I0117 00:18:30.643920 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.643947 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.645079 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.645094 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.650254 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.650305 42341 instancegroups.go:431] Draining the node: "node-2b.local". I0117 00:18:30.650699 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.650714 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.651847 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.651862 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.657441 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.657486 42341 instancegroups.go:431] Draining the node: "node-2c.local". I0117 00:18:30.658017 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.658039 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.659165 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.659180 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.664348 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.664384 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0117 00:18:30.664625 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.664638 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.665766 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.665787 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.665807 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.665817 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.665830 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.666940 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.666959 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.666964 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.666973 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.668083 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.668096 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.668107 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.668124 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.668134 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.669233 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.669266 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.669276 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.669290 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.670380 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.670405 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.670414 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.670424 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.671553 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.671564 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.671577 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.671583 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.671592 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.672690 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.672708 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.672714 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.672723 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.673828 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0117 00:18:30.673843 42341 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0117 00:18:30.673848 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.673857 42341 instancegroups.go:469] waiting for 1ms after terminating instance W0117 00:18:30.674944 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0117 00:18:30.674964 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0117 00:18:30.675181 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.675192 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.676290 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.676314 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.676331 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.676365 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.676378 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.676385 42341 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.676392 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.676758 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.677018 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.677065 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.677079 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.678154 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.678169 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.678177 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.678193 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.678440 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.678466 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.678477 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.679570 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.679584 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.679591 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.679600 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.679605 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.679611 42341 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.679616 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.679967 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.680253 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.680266 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.681349 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.681361 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.681368 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.681383 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.681653 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.681665 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.682746 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.682760 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.682769 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.682783 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.683063 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.683075 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.684160 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.684174 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.684181 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.684187 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.684191 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.684196 42341 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.684200 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:30.684529 42341 instancegroups.go:431] Draining the node: "node-2a.local". I0117 00:18:30.684774 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.684786 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.685901 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.685913 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.685919 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.685928 42341 instancegroups.go:431] Draining the node: "node-2b.local". I0117 00:18:30.686184 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.686196 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.687698 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.687744 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.687761 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.687797 42341 instancegroups.go:431] Draining the node: "node-2c.local". I0117 00:18:30.688357 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.688384 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.690853 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.690880 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0117 00:18:30.690894 42341 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0117 00:18:30.690911 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0117 00:18:30.691101 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0117 00:18:30.691249 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.691265 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.692369 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.692389 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.697591 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.697647 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.697658 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.697664 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.698007 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.698313 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.698352 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.698366 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.699459 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.699471 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.704632 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.704668 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.705059 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.705092 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.705107 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.706210 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.706226 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.711398 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.711424 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.711432 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.711437 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.711829 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.712137 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.712154 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.713253 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.713265 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.718436 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.718474 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.718851 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.718867 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.719931 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.719958 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.725121 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.725151 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.725495 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.725511 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.726642 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.726656 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.731824 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.731847 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.731858 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.731866 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:30.733053 42341 instancegroups.go:431] Draining the node: "node-2a.local". I0117 00:18:30.733507 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.733529 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.734640 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.734656 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.739833 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.739876 42341 instancegroups.go:431] Draining the node: "node-2b.local". I0117 00:18:30.740423 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.740444 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.741680 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.741694 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.746870 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.746912 42341 instancegroups.go:431] Draining the node: "node-2c.local". I0117 00:18:30.747435 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.747456 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.748588 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.748601 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.753779 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.753805 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.06s) === RUN TestRollingUpdateEmptyGroup I0117 00:18:30.753925 42341 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0117 00:18:30.754195 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.754221 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.755339 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.755373 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.755388 42341 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0117 00:18:30.755688 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.755706 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.756796 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.756808 42341 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0117 00:18:30.756816 42341 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0117 00:18:30.756929 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.756946 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.756953 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.756960 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0117 00:18:30.757027 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.757034 42341 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0117 00:18:30.757039 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.757045 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0117 00:18:30.757128 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.757139 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.758220 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.758234 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.763422 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.763476 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.763486 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.763491 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.763813 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.764070 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.764128 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.764141 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.765234 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.765258 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.765272 42341 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0117 00:18:30.765426 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.765440 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.766517 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.766530 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.771732 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.771780 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.771795 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.771806 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.772137 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.772421 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.772464 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.772480 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.773617 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.773633 42341 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0117 00:18:30.773641 42341 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0117 00:18:30.773807 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.773817 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.773821 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.774170 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.774442 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.774454 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.776720 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.776750 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.781948 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.782001 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.782545 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.782566 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.783699 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.783716 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.791182 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.791233 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.791790 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.791812 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.792926 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.792947 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.798144 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.798180 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0117 00:18:30.798414 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.798431 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.798458 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.798471 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0117 00:18:30.798608 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.798624 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.798641 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.798652 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0117 00:18:30.798777 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.798791 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.798800 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.798810 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0117 00:18:30.798952 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.798965 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.798973 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.799616 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.800048 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.800070 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.801160 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.801173 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.806357 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.806396 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.806771 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.806788 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.807890 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.807909 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.813128 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.813159 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.815930 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.815961 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.817059 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.817087 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.822208 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.822223 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.822235 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.822245 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.822256 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0117 00:18:30.822424 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.822436 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.822443 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.822958 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.823352 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.823371 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.824492 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.824518 42341 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0117 00:18:30.824525 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.824532 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0117 00:18:30.824599 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.824607 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.824611 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.824935 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.825187 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.825199 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.826293 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.826307 42341 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0117 00:18:30.826318 42341 instancegroups.go:509] Cluster did not validate within 0s E0117 00:18:30.826328 42341 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0117 00:18:30.826466 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.826481 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.827586 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.827602 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.828706 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.833890 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.835014 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.840172 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.841281 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.846456 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.846509 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.846526 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.846534 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.847055 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.847495 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.847544 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.847564 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.848671 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.848692 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.854171 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.854226 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.854768 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.854814 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.854830 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.855947 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.855974 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.861185 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.861201 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.861211 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.861215 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.861560 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.861821 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.861834 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.862997 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.863015 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.868170 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.868199 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.868513 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.868527 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.869655 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.869673 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.874890 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.874918 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.875318 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.875335 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.876429 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.876447 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.881572 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.881588 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.881598 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.881606 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:30.882037 42341 instancegroups.go:431] Draining the node: "node-2a.local". I0117 00:18:30.882351 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.882365 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.883460 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.883480 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.888717 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.888749 42341 instancegroups.go:431] Draining the node: "node-2b.local". I0117 00:18:30.889206 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.889227 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.890344 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.890364 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.895596 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.895637 42341 instancegroups.go:431] Draining the node: "node-2c.local". I0117 00:18:30.896052 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.896069 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.897224 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.897250 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.902429 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.902457 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.08s) === RUN TestRollingUpdateValidatesAfterBastion I0117 00:18:30.902650 42341 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0117 00:18:30.902663 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.903772 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.903791 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.904909 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.905999 42341 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0117 00:18:30.907079 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.912229 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.912272 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.912284 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.912295 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.912685 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.912995 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.913035 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.913050 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.914160 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.914175 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.919358 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.919395 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.919922 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.919970 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.919988 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.921104 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.921131 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.926279 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.926299 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.926307 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.926322 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:30.926727 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.927003 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.927018 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.928174 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.928201 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.933364 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.933393 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.933756 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.933773 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.934877 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.934895 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.940075 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.940134 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:30.940677 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:30.940700 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.941821 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.941838 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.946993 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.947012 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.947018 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.947024 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:30.947435 42341 instancegroups.go:431] Draining the node: "node-2a.local". I0117 00:18:30.947714 42341 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0117 00:18:30.947731 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.948846 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.948858 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.954072 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.954132 42341 instancegroups.go:431] Draining the node: "node-2b.local". I0117 00:18:30.954776 42341 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0117 00:18:30.954803 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.955966 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.955991 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.961162 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.961190 42341 instancegroups.go:431] Draining the node: "node-2c.local". I0117 00:18:30.961534 42341 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0117 00:18:30.961549 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.962659 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.962686 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.967883 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.967921 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0117 00:18:30.968324 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.968338 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.968345 42341 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0117 00:18:30.968784 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:30.969165 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:30.969185 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.970278 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.970289 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.975471 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.975491 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:30.975831 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:30.975845 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.976971 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.976986 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.982033 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.982088 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.01s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0117 00:18:30.982301 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.982313 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.982320 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:30.982716 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:30.983037 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:30.983077 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:30.983092 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.984270 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.984293 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.989534 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.989562 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:30.989956 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:30.989995 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:30.990010 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:30.991162 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.991186 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:30.996421 42341 instancegroups.go:540] Cluster validated. I0117 00:18:30.996454 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0117 00:18:30.996743 42341 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0117 00:18:30.996774 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0117 00:18:30.996790 42341 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0117 00:18:30.996802 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0117 00:18:30.996814 42341 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0117 00:18:30.996821 42341 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0117 00:18:30.996833 42341 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0117 00:18:30.996848 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0117 00:18:30.997031 42341 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0117 00:18:30.997068 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:30.998143 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:30.998164 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:31.003351 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.003376 42341 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0117 00:18:31.003433 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.003449 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.003460 42341 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0117 00:18:31.003919 42341 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0117 00:18:31.003935 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.003946 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.003953 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:31.004437 42341 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0117 00:18:31.004477 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:31.005617 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.005628 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:31.010834 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.010848 42341 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0117 00:18:31.010853 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.010859 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.010863 42341 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0117 00:18:31.011254 42341 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0117 00:18:31.011305 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:31.012429 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.012456 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:31.017695 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.017725 42341 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0117 00:18:31.017744 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0117 00:18:31.017962 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.017985 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.017996 42341 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0117 00:18:31.019465 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:31.019991 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:31.020032 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.021219 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.021254 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.021295 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:31.021316 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:31.022410 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:31.022612 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:31.022643 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.023806 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.023878 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.124359 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.124439 42341 instancegroups.go:431] Draining the node: "node-1e.local". I0117 00:18:31.124489 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:31.125582 42341 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0117 00:18:31.125775 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:31.125814 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.126995 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.127030 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.127070 42341 instancegroups.go:431] Draining the node: "node-1f.local". I0117 00:18:31.127673 42341 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0117 00:18:31.127707 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.128910 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.128956 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.229444 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.229513 42341 instancegroups.go:431] Draining the node: "node-1g.local". I0117 00:18:31.230309 42341 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0117 00:18:31.230348 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.231537 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.231572 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.231592 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0117 00:18:31.231787 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.231807 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.231819 42341 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0117 00:18:31.233038 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:31.233079 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:31.233868 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:31.234041 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:31.234068 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.235145 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.235183 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.335583 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.335639 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:31.335675 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:31.336242 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:31.336551 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:31.336575 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.337720 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.337750 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.337772 42341 instancegroups.go:431] Draining the node: "node-1e.local". I0117 00:18:31.338290 42341 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0117 00:18:31.338317 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.339432 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.339462 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.439929 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.439993 42341 instancegroups.go:431] Draining the node: "node-1f.local". I0117 00:18:31.440749 42341 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0117 00:18:31.440794 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.441941 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.441961 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.441972 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0117 00:18:31.442094 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.442105 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.442110 42341 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0117 00:18:31.443554 42341 instancegroups.go:431] Draining the node: "master-1a.local". I0117 00:18:31.444035 42341 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0117 00:18:31.444080 42341 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0117 00:18:31.444106 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.445281 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.445312 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.445339 42341 instancegroups.go:431] Draining the node: "master-1c.local". I0117 00:18:31.445410 42341 instancegroups.go:431] Draining the node: "master-1b.local". I0117 00:18:31.446243 42341 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0117 00:18:31.446292 42341 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0117 00:18:31.446459 42341 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0117 00:18:31.446507 42341 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0117 00:18:31.446538 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.447672 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.447696 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.548194 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.548264 42341 instancegroups.go:431] Draining the node: "master-1e.local". I0117 00:18:31.548288 42341 instancegroups.go:431] Draining the node: "master-1d.local". I0117 00:18:31.549340 42341 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0117 00:18:31.549408 42341 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0117 00:18:31.549561 42341 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0117 00:18:31.549608 42341 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0117 00:18:31.549655 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.550871 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.550908 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.550937 42341 instancegroups.go:431] Draining the node: "master-1f.local". I0117 00:18:31.551536 42341 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0117 00:18:31.551579 42341 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0117 00:18:31.551606 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.552813 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.552858 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.653368 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.653434 42341 instancegroups.go:431] Draining the node: "master-1g.local". I0117 00:18:31.654171 42341 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0117 00:18:31.654239 42341 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0117 00:18:31.654278 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.655418 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.655446 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.655461 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0117 00:18:31.655653 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.655671 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.655681 42341 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0117 00:18:31.656708 42341 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0117 00:18:31.656752 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:31.657898 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.657932 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.657945 42341 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0117 00:18:31.657981 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:31.659085 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.659110 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.659163 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:31.659212 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:31.659754 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:31.660339 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:31.660388 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.661542 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.661594 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.762049 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.762099 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:31.762155 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:31.762565 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:31.762770 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:31.762786 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.763934 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.763952 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.763964 42341 instancegroups.go:431] Draining the node: "node-1e.local". I0117 00:18:31.764239 42341 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0117 00:18:31.764257 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.765349 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.765371 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.865989 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.866049 42341 instancegroups.go:431] Draining the node: "node-1f.local". I0117 00:18:31.866754 42341 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0117 00:18:31.866800 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.867966 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.868000 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.868018 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0117 00:18:31.868250 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.868277 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.868290 42341 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0117 00:18:31.869550 42341 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0117 00:18:31.869584 42341 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0117 00:18:31.869623 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:31.870825 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.870859 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.870890 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:31.870903 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:31.871363 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:31.871683 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:31.871704 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.872893 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.872940 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.973373 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.973439 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:31.973508 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:31.974375 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:31.974581 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:31.974619 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.975753 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.975796 42341 instancegroups.go:540] Cluster validated. I0117 00:18:31.975826 42341 instancegroups.go:431] Draining the node: "node-1e.local". I0117 00:18:31.976396 42341 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0117 00:18:31.976428 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:31.977626 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:31.977680 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.078336 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.078385 42341 instancegroups.go:431] Draining the node: "node-1f.local". I0117 00:18:32.078833 42341 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0117 00:18:32.078860 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.080079 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.080158 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.080181 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0117 00:18:32.080384 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.080401 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.080411 42341 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0117 00:18:32.080959 42341 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0117 00:18:32.080991 42341 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0117 00:18:32.081022 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:32.082164 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.082195 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.087351 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.087392 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:32.087428 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:32.087859 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:32.087884 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.088188 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:32.088206 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.089098 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.089153 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.094260 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.094287 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0117 00:18:32.094467 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.094481 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.094487 42341 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0117 00:18:32.094842 42341 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0117 00:18:32.094875 42341 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0117 00:18:32.094884 42341 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0117 00:18:32.094898 42341 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0117 00:18:32.094914 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:32.096133 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.096176 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.101435 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.101475 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:32.101478 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:32.102370 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:32.102403 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.102583 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:32.102611 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.103607 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.103640 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.108893 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.108932 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.01s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0117 00:18:32.109913 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.109975 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.109994 42341 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0117 00:18:32.111836 42341 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0117 00:18:32.111879 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:32.113088 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.113138 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.113151 42341 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0117 00:18:32.113200 42341 instancegroups.go:203] waiting for 1ms after detaching instance I0117 00:18:32.114325 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.114356 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.114392 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:32.114404 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:32.114477 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:32.115132 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:32.115171 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.115568 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:32.115599 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.116035 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:32.116067 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.116342 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.217220 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.217289 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:32.217996 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:32.218038 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.219179 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.219205 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.219217 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0117 00:18:32.219348 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.219363 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.219368 42341 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0117 00:18:32.220561 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:32.221043 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:32.221078 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.222248 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.222282 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.222315 42341 instancegroups.go:431] Draining the node: "node-1e.local". I0117 00:18:32.222326 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:32.223198 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:32.223410 42341 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0117 00:18:32.223446 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.224615 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.224655 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.325490 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.325552 42341 instancegroups.go:431] Draining the node: "node-1g.local". I0117 00:18:32.325615 42341 instancegroups.go:431] Draining the node: "node-1f.local". I0117 00:18:32.326696 42341 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0117 00:18:32.326912 42341 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0117 00:18:32.326952 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.328184 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.328219 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.328248 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:32.328893 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:32.328932 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.330155 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.330200 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.431162 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.431223 42341 instancegroups.go:431] Draining the node: "node-1d.local". I0117 00:18:32.431911 42341 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0117 00:18:32.431957 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.433181 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.433218 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.433239 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.21s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0117 00:18:32.433426 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.433444 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.433456 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0117 00:18:32.433468 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0117 00:18:32.433478 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0117 00:18:32.433497 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0117 00:18:32.433603 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.433619 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.433628 42341 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0117 00:18:32.434346 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0117 00:18:32.434374 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0117 00:18:32.434382 42341 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0117 00:18:32.434411 42341 instancegroups.go:431] Draining the node: "node-1a.local". I0117 00:18:32.435026 42341 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0117 00:18:32.435053 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.436196 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.436225 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.441478 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.441516 42341 instancegroups.go:431] Draining the node: "node-1b.local". I0117 00:18:32.442166 42341 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0117 00:18:32.442195 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.443364 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.443392 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.448842 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.448887 42341 instancegroups.go:431] Draining the node: "node-1c.local". I0117 00:18:32.449504 42341 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0117 00:18:32.449539 42341 instancegroups.go:469] waiting for 1ms after terminating instance I0117 00:18:32.450749 42341 instancegroups.go:504] Validating the cluster. I0117 00:18:32.450776 42341 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0117 00:18:32.456052 42341 instancegroups.go:540] Cluster validated. I0117 00:18:32.456085 42341 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 1.929s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.006s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.013s === RUN TestParse E0117 00:18:30.546351 42342 versions.go:96] unable to parse Kubernetes version "" E0117 00:18:30.546439 42342 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.011s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.041s ? k8s.io/kops/pkg/kopscontrollerclient [no test files] === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.11s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.01s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.165s ? k8s.io/kops/pkg/kubemanifest [no test files] === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.089s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.072s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.073s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0117 00:18:30.586309 42343 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.055s ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] === RUN Test_RunEtcdManagerBuilder I0117 00:18:30.608562 42353 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0117 00:18:30.638683 42353 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0117 00:18:30.639830 42353 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.03s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.02s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.00s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.00s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.109s ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] === RUN Test_RunKubeApiserverBuilder I0117 00:18:30.589513 42354 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.064s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.073s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.025s ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.069s === RUN TestServerGroupBuilder I0117 00:18:30.596760 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.604602 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.612368 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.621887 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.628284 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.640269 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.664941 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.672463 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.680922 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.691970 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.697329 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.702170 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.707057 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.711481 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.714873 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.718825 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.737295 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:30.742557 42359 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.15s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.213s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.042s ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.029s ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.022s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.00s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (0.26s) --- PASS: TestIssueCert/ca (0.13s) --- PASS: TestIssueCert/client (0.02s) --- PASS: TestIssueCert/clientOneYear (0.10s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 0.268s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.004s ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] === RUN TestAddUntaggedRouteTables I0117 00:18:35.378983 43744 routetable.go:53] DescribeRouteTables: { } W0117 00:18:35.379048 43744 tags.go:67] cluster tag not found on route-table:rtb-1234 I0117 00:18:35.379061 43744 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0117 00:18:35.379140 43744 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0117 00:18:35.379203 43744 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0117 00:18:35.379431 43744 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0117 00:18:35.379753 43744 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0117 00:18:35.379843 43744 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0117 00:18:35.380464 43744 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0117 00:18:35.380816 43744 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0117 00:18:35.380855 43744 volumes.go:128] DescribeVolumes: { } W0117 00:18:35.380878 43744 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0117 00:18:35.380997 43744 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:35.381060 43744 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:35.381079 43744 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:35.381125 43744 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:35.381144 43744 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:35.381181 43744 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:35.381202 43744 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:35.381215 43744 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:35.381226 43744 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:35.381242 43744 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:35.381258 43744 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0117 00:18:35.381276 43744 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0117 00:18:35.381287 43744 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0117 00:18:35.381306 43744 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0117 00:18:35.381315 43744 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0117 00:18:35.381328 43744 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0117 00:18:35.381343 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0117 00:18:35.381356 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0117 00:18:35.381374 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0117 00:18:35.381384 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0117 00:18:35.381394 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0117 00:18:35.381403 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0117 00:18:35.381413 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0117 00:18:35.381420 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0117 00:18:35.381430 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0117 00:18:35.381439 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0117 00:18:35.381452 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0117 00:18:35.381460 43744 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.049s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.025s ? k8s.io/kops/pkg/resources/digitalocean [no test files] === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.048s ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.004s ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/tokens [no test files] === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.004s ? k8s.io/kops/pkg/try [no test files] === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.004s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.004s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.004s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.00s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.033s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.069s ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.007s ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] === RUN TestRemovesDuplicateGuardedBlocks W0117 00:18:35.876484 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876532 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876540 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876546 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876551 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876556 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876562 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876568 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876573 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876579 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876585 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876591 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876596 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876603 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.876609 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.876614 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.889972 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890002 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890066 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890075 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890157 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890166 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890218 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890226 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890273 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890287 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890350 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890362 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890412 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890421 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890480 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890495 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890548 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890556 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890633 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890642 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890690 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890698 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890745 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890753 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890799 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890807 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890853 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890862 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890906 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890914 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.890963 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.890971 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891016 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891024 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891075 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891083 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891138 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891147 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891222 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891231 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891281 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891289 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891337 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891346 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891391 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891399 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891447 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891456 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891504 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891513 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891560 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891568 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891614 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891622 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891671 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891691 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891740 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891748 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891808 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891817 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891865 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891875 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891925 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891932 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.891978 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.891985 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892031 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892039 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892092 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892101 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892182 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892191 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892257 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892266 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892312 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892320 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892366 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892374 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892421 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892428 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892492 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892503 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892550 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892559 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892606 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892614 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892662 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892670 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892716 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892738 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892788 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892796 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892843 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892851 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892901 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892910 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.892962 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.892970 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893016 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893024 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893072 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893079 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893140 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893150 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893201 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893208 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893254 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893262 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893308 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893317 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893367 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893376 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.893425 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.893433 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894038 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894047 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894086 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894091 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894137 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894143 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894176 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894180 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894209 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894214 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894257 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894262 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894293 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894298 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894325 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894329 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894357 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894361 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894388 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894392 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894419 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894422 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894450 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894460 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894488 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894492 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894518 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894522 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894550 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894554 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894585 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894592 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894630 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894635 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894662 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894666 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894693 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894697 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894724 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894727 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894754 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894758 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894788 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894792 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894820 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894824 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894851 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894855 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894882 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894886 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894913 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894916 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894952 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894956 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.894986 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.894989 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895017 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895020 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895047 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895050 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895078 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895081 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895108 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895111 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895201 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895209 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895250 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895258 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895298 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895305 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895355 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895364 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895405 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895412 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895465 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895473 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895513 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895519 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895557 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895564 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895603 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895610 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.895648 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.895654 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.02s) === RUN TestRecoversFromBadNesting W0117 00:18:35.895992 44142 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0117 00:18:35.896003 44142 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0117 00:18:35.896008 44142 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0117 00:18:35.896013 44142 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0117 00:18:35.896020 44142 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0117 00:18:35.896025 44142 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0117 00:18:35.896030 44142 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0117 00:18:35.896049 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896058 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896064 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.896069 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896075 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.896080 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896086 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.896091 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896097 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.896102 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896108 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896122 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896128 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896133 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.896138 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.896143 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906453 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906476 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906515 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906520 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906550 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906555 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906589 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906594 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906642 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906647 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906677 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906681 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906710 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906716 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906746 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906751 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906780 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906785 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906814 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906820 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906851 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906860 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906892 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906898 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906953 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906957 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.906988 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.906992 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907021 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907026 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907056 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907061 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907151 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907160 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907209 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907217 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907258 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907265 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907310 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907317 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907357 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907363 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907402 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907409 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907451 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907458 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907497 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907504 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907542 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907549 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907590 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907597 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907636 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907641 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907671 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907676 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907719 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907728 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907771 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907778 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907817 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907824 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907863 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907870 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907909 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907915 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.907954 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.907961 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908000 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908007 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908047 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908055 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908093 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908100 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908157 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908171 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908227 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908235 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908280 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908287 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908331 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908337 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908385 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908393 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908437 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908443 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908488 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908495 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908538 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908552 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908597 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908604 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908649 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908656 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908700 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908706 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908751 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908758 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908801 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908808 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908851 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908858 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908903 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908909 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.908974 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.908982 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909037 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909047 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909092 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909100 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909156 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909164 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909207 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909215 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909258 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909265 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909310 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909316 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909360 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909367 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909412 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909419 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909464 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909471 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909515 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909521 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909565 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909572 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909616 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909623 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909666 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909672 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909714 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909720 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909764 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909771 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909815 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909823 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909867 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909876 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909920 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909927 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.909971 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.909978 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910021 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910028 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910073 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910079 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910204 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910233 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910300 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910327 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910409 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910437 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910503 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910531 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910596 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910623 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910687 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910713 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910777 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910805 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910875 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910906 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.910963 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.910971 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911017 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911025 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911069 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911076 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911146 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911159 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911215 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911222 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911270 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911278 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911327 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911333 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911373 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911381 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911428 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911435 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911479 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911486 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911529 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911535 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911580 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911587 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911633 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911639 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911683 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911689 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911732 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911739 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911781 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911787 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0117 00:18:35.911832 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0117 00:18:35.911839 44142 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.02s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.040s ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.00s) PASS ok k8s.io/kops/tests/codecs 0.030s ? k8s.io/kops/tests/fuzz [no test files] === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.00s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.01s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.056s ? k8s.io/kops/tests/integration/channel/simple [no test files] === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.01s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.01s) PASS ok k8s.io/kops/tests/integration/conversion 0.040s ? k8s.io/kops/upup/models [no test files] === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0117 00:18:37.849424 45811 files.go:57] Writing file "/tmp/TestWriteFile2210367589/001/SubDir/test1.tmp" I0117 00:18:37.849504 45811 files.go:113] Changing file mode for "/tmp/TestWriteFile2210367589/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.00s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.026s === RUN TestBootstrapChannelBuilder_BuildTasks I0117 00:18:42.283745 46095 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:42.283861 46095 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:42.283884 46095 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:42.283911 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:42.283926 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:42.283953 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:42.283974 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:42.283982 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:42.284000 46095 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:42.284017 46095 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:42.288722 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.348724 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.492329 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.625039 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.760271 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:42.894457 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:43.000237 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:43.162274 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:43.756609 46095 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.60s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0117 00:18:43.883181 46095 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:43.883289 46095 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:43.883369 46095 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:43.883413 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:43.883444 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:43.883481 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:43.883514 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:43.883535 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:43.883562 46095 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:43.883582 46095 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:43.883604 46095 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0117 00:18:43.885138 46095 zones.go:93] ListHostedZonesPages { } I0117 00:18:44.048841 46095 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.17s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0117 00:18:44.049028 46095 featureflag.go:164] FeatureFlag "ImageDigest"=false I0117 00:18:44.049146 46095 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:44.049203 46095 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0117 00:18:44.049240 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0117 00:18:44.049270 46095 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0117 00:18:44.049313 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0117 00:18:44.049342 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0117 00:18:44.049360 46095 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0117 00:18:44.049386 46095 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0117 00:18:44.049407 46095 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0117 00:18:44.050861 46095 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.13s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.70s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0117 00:18:44.908392 46095 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.01s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0117 00:18:44.952404 46095 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0117 00:18:44.952487 46095 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0117 00:18:44.952507 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0117 00:18:44.952576 46095 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0117 00:18:44.952595 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0117 00:18:44.952664 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0117 00:18:44.952728 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0117 00:18:44.952799 46095 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0117 00:18:44.952818 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0117 00:18:44.952885 46095 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0117 00:18:44.952905 46095 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0117 00:18:44.953013 46095 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0117 00:18:44.953140 46095 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0117 00:18:44.953221 46095 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0117 00:18:44.953232 46095 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0117 00:18:44.953239 46095 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0117 00:18:44.953257 46095 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0117 00:18:44.953272 46095 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0117 00:18:44.953286 46095 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0117 00:18:44.953296 46095 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0117 00:18:44.953306 46095 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0117 00:18:44.954785 46095 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0117 00:18:44.955040 46095 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 2.760s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0117 00:18:42.269700 46097 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1139213687/001 I0117 00:18:42.269898 46097 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1139213687/001 I0117 00:18:42.270376 46097 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender1139213687/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.00s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0117 00:18:42.273888 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0117 00:18:42.273943 46097 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0117 00:18:42.273977 46097 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0117 00:18:42.274038 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.274111 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.274158 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.274168 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.274245 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.274269 46097 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0117 00:18:42.274287 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.274340 46097 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0117 00:18:42.274388 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0117 00:18:42.274425 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.274446 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.274465 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.274473 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.274488 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.274506 46097 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0117 00:18:42.274531 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0117 00:18:42.274595 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.274625 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.274667 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.274685 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.274696 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.274708 46097 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0117 00:18:42.274737 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.274822 46097 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0117 00:18:42.274850 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.274862 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.274875 46097 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0117 00:18:42.274913 46097 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.274974 46097 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0117 00:18:42.275003 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.275014 46097 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0117 00:18:42.275031 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0117 00:18:42.275073 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.275093 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.275125 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.275134 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.275147 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.275160 46097 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0117 00:18:42.275179 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.275207 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.275219 46097 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0117 00:18:42.275236 46097 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.275265 46097 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0117 00:18:42.275287 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0117 00:18:42.275306 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0117 00:18:42.275343 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0117 00:18:42.275360 46097 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0117 00:18:42.275371 46097 internetgateways.go:66] CreateInternetGateway: { } I0117 00:18:42.275383 46097 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0117 00:18:42.275407 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.275426 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.275445 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.275452 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.275480 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.275492 46097 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0117 00:18:42.275506 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.275534 46097 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0117 00:18:42.275578 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0117 00:18:42.275605 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.275623 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.275643 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.275650 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.275664 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.275680 46097 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0117 00:18:42.275706 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0117 00:18:42.275941 46097 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2070113135/001 I0117 00:18:42.276088 46097 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender2070113135/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0117 00:18:42.276312 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.276337 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.276379 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.276397 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.276409 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.276421 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.276452 46097 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0117 00:18:42.276545 46097 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0117 00:18:42.276571 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0117 00:18:42.276588 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0117 00:18:42.276613 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.276634 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.276655 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.276663 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.276675 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.276688 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.276707 46097 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0117 00:18:42.276748 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0117 00:18:42.276869 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.276897 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.276936 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.276953 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.276964 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.276980 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.277005 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.277047 46097 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0117 00:18:42.277065 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.277083 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.277096 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0117 00:18:42.277173 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.277198 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.277219 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.277227 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.277239 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.277251 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.277270 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.277295 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.277306 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0117 00:18:42.277384 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.277420 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.277481 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.277507 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.277525 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.277543 46097 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0117 00:18:42.277583 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.277654 46097 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0117 00:18:42.277685 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.277781 46097 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:18:42.277808 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.277825 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.277840 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0117 00:18:42.277882 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.277908 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.277932 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.277941 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.277953 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.277965 46097 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0117 00:18:42.277986 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278025 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.278085 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.278110 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0117 00:18:42.278188 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.278211 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.278256 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.278275 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.278286 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278298 46097 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0117 00:18:42.278315 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278348 46097 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0117 00:18:42.278373 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.278448 46097 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0117 00:18:42.278472 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.278485 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.278498 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0117 00:18:42.278532 46097 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0117 00:18:42.278553 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.278574 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.278581 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.278594 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278606 46097 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0117 00:18:42.278624 46097 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0117 00:18:42.278645 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278695 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.278716 46097 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0117 00:18:42.278750 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0117 00:18:42.278783 46097 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0117 00:18:42.278825 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.278846 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.278867 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.278876 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.278911 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.278924 46097 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0117 00:18:42.278939 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.278956 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.279004 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0117 00:18:42.279016 46097 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0117 00:18:42.279031 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0117 00:18:42.279065 46097 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0117 00:18:42.279084 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.279104 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.279110 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.279141 46097 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0117 00:18:42.279159 46097 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0117 00:18:42.279187 46097 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0117 00:18:42.279233 46097 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.279255 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.279294 46097 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0117 00:18:42.279312 46097 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0117 00:18:42.279322 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.279333 46097 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.279350 46097 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.279375 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0117 00:18:42.279398 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.279406 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.279419 46097 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0117 00:18:42.279430 46097 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0117 00:18:42.279483 46097 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0117 00:18:42.279515 46097 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.279534 46097 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0117 00:18:42.279554 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0117 00:18:42.279560 46097 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0117 00:18:42.279573 46097 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.054s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.038s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.027s === RUN TestDiskRenderAzure I0117 00:18:42.253988 46099 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0117 00:18:42.254287 46099 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0117 00:18:42.254461 46099 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0117 00:18:42.254976 46099 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0117 00:18:42.255170 46099 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0117 00:18:42.255364 46099 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0117 00:18:42.255513 46099 resourcegroup.go:108] Creating a new Resource Group with name: rg I0117 00:18:42.255522 46099 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0117 00:18:42.255662 46099 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0117 00:18:42.256107 46099 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0117 00:18:42.256315 46099 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0117 00:18:42.256531 46099 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0117 00:18:42.256819 46099 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0117 00:18:42.256971 46099 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.032s ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.024s ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] === RUN TestProjectIAMBinding I0117 00:18:42.277425 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.277780 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.277805 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278060 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.278075 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278165 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0117 00:18:42.278236 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278293 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.278313 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278372 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.278385 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278418 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0117 00:18:42.278478 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278624 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.278639 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278824 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0117 00:18:42.278838 46101 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0117 00:18:42.278913 46101 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.053s ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.053s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.038s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.030s ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.028s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.006s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.028s ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0117 00:18:42.280709 46109 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0117 00:18:42.280761 46109 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0117 00:18:42.280771 46109 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0117 00:18:42.280782 46109 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0117 00:18:42.280791 46109 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0117 00:18:42.280799 46109 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0117 00:18:42.280810 46109 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0117 00:18:42.281251 46109 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.055s ? k8s.io/kops/upup/pkg/fi/secrets [no test files] === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.005s ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.005s ? k8s.io/kops/util/pkg/env [no test files] === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.005s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.007s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.006s ? k8s.io/kops/util/pkg/mirrors [no test files] === RUN TestGetProxyEnvVars W0117 00:18:42.249460 46115 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.021s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.026s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.005s ? k8s.io/kops/util/pkg/tables [no test files] === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.005s ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.026s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0117 00:18:46.505150 46514 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.052s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... kubernetes >>> kops*: Package size: 146.5 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r16.apk >>> kops: Build complete at Sat, 17 Jan 2026 00:20:10 +0000 elapsed time 0h 3m 31s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/4) Purging .makedepends-kops (20260117.001640) (2/4) Purging kubernetes (1.34.3-r1) (3/4) Purging go (1.25.6-r0) (4/4) Purging bash (5.3.3-r1) Executing bash-5.3.3-r1.pre-deinstall Executing busybox-1.37.0-r31.trigger OK: 441.2 MiB in 107 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...