>>> kops: Building testing/kops 1.28.4-r2 (using abuild 3.12.0-r5) started Sun, 07 Apr 2024 01:54:34 +0000 >>> kops: Checking sanity of /home/buildozer/aports/testing/kops/APKBUILD... >>> kops: Analyzing dependencies... >>> kops: Installing for build: build-base kubernetes go bash (1/5) Installing kubernetes (1.29.3-r1) (2/5) Installing go (1.22.2-r0) (3/5) Installing readline (8.2.10-r0) (4/5) Installing bash (5.2.26-r0) Executing bash-5.2.26-r0.post-install (5/5) Installing .makedepends-kops (20240407.015436) Executing busybox-1.36.1-r25.trigger OK: 562 MiB in 112 packages >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Cleaning up tmpdir >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 32.7M 0 111k 0 0 579k 0 0:00:57 --:--:-- 0:00:57 580k 100 32.7M 100 32.7M 0 0 48.8M 0 --:--:-- --:--:-- --:--:-- 48.8M >>> kops: Fetching https://distfiles.alpinelinux.org/distfiles/edge/kops-1.28.4.tar.gz >>> kops: Checking sha512sums... kops-1.28.4.tar.gz: OK >>> kops: Unpacking /var/cache/distfiles/edge/kops-1.28.4.tar.gz... fatal: not a git repository (or any of the parent directories): .git mkdir -p /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64 GOOS=linux GOARCH=amd64 go build "-trimpath" -o /home/buildozer/aports/testing/kops/src/kops-1.28.4/.build/dist/linux/amd64/kops -ldflags=all=" -X k8s.io/kops.Version=1.28.4 -X k8s.io/kops.GitVersion=" k8s.io/kops/cmd/kops go: downloading k8s.io/apimachinery v0.28.1 go: downloading golang.org/x/crypto v0.14.0 go: downloading go.uber.org/multierr v1.11.0 go: downloading github.com/aws/amazon-ec2-instance-selector/v2 v2.4.1 go: downloading github.com/aws/aws-sdk-go v1.49.24 go: downloading helm.sh/helm/v3 v3.12.3 go: downloading github.com/spf13/pflag v1.0.5 go: downloading github.com/blang/semver/v4 v4.0.0 go: downloading github.com/spf13/cobra v1.7.0 go: downloading github.com/google/go-containerregistry v0.16.1 go: downloading github.com/spf13/viper v1.16.0 go: downloading k8s.io/cli-runtime v0.28.1 go: downloading k8s.io/client-go v0.28.1 go: downloading k8s.io/klog/v2 v2.100.1 go: downloading k8s.io/api v0.28.1 go: downloading k8s.io/kubectl v0.28.1 go: downloading sigs.k8s.io/yaml v1.3.0 go: downloading github.com/cert-manager/cert-manager v1.12.3 go: downloading k8s.io/klog v1.0.0 go: downloading golang.org/x/net v0.17.0 go: downloading github.com/MakeNowJust/heredoc/v2 v2.0.1 go: downloading github.com/Masterminds/sprig/v3 v3.2.3 go: downloading github.com/scaleway/scaleway-sdk-go v1.0.0-beta.20.0.20230829075301-d16b548612e4 go: downloading github.com/apparentlymart/go-cidr v1.1.0 go: downloading github.com/MakeNowJust/heredoc v1.0.0 go: downloading golang.org/x/sync v0.3.0 go: downloading k8s.io/cloud-provider-aws v1.28.1 go: downloading github.com/Azure/azure-pipeline-go v0.2.3 go: downloading github.com/Azure/azure-storage-blob-go v0.15.0 go: downloading github.com/go-ini/ini v1.67.0 go: downloading github.com/gophercloud/gophercloud v1.6.0 go: downloading github.com/pkg/sftp v1.13.6 go: downloading golang.org/x/oauth2 v0.11.0 go: downloading google.golang.org/api v0.138.0 go: downloading gopkg.in/yaml.v2 v2.4.0 go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/fsnotify/fsnotify v1.6.0 go: downloading github.com/mitchellh/mapstructure v1.5.0 go: downloading github.com/spf13/afero v1.9.5 go: downloading github.com/spf13/cast v1.5.1 go: downloading github.com/spf13/jwalterweatherman v1.1.0 go: downloading github.com/go-logr/logr v1.2.4 go: downloading github.com/mitchellh/go-homedir v1.1.0 go: downloading github.com/imdario/mergo v0.3.15 go: downloading github.com/evanphx/json-patch v5.6.0+incompatible go: downloading github.com/google/uuid v1.3.1 go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b go: downloading github.com/gogo/protobuf v1.3.2 go: downloading github.com/google/gofuzz v1.2.0 go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.3.0 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/sergi/go-diff v1.3.1 go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 go: downloading github.com/pelletier/go-toml v1.9.5 go: downloading github.com/digitalocean/godo v1.102.1 go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible go: downloading github.com/hetznercloud/hcloud-go v1.50.0 go: downloading github.com/Azure/go-autorest/autorest v0.11.29 go: downloading github.com/Azure/go-autorest/autorest/azure/auth v0.5.12 go: downloading k8s.io/mount-utils v0.28.1 go: downloading github.com/Masterminds/goutils v1.1.1 go: downloading github.com/Masterminds/semver/v3 v3.2.1 go: downloading github.com/huandu/xstrings v1.4.0 go: downloading github.com/mitchellh/copystructure v1.2.0 go: downloading github.com/shopspring/decimal v1.3.1 go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/opencontainers/go-digest v1.0.0 go: downloading github.com/docker/cli v24.0.5+incompatible go: downloading github.com/Azure/go-autorest v14.2.0+incompatible go: downloading golang.org/x/sys v0.13.0 go: downloading github.com/chai2010/gettext-go v1.0.2 go: downloading github.com/mitchellh/go-wordwrap v1.0.1 go: downloading github.com/russross/blackfriday/v2 v2.1.0 go: downloading golang.org/x/term v0.13.0 go: downloading google.golang.org/grpc v1.57.0 go: downloading github.com/spotinst/spotinst-sdk-go v1.145.0 go: downloading github.com/mattn/go-ieproxy v0.0.1 go: downloading gopkg.in/gcfg.v1 v1.2.3 go: downloading k8s.io/cloud-provider v0.28.0 go: downloading k8s.io/component-base v0.28.1 go: downloading k8s.io/csi-translation-lib v0.28.0 go: downloading github.com/kr/fs v0.1.0 go: downloading golang.org/x/exp v0.0.0-20230817173708-d852ddb80c63 go: downloading golang.org/x/time v0.3.0 go: downloading github.com/golang/protobuf v1.5.3 go: downloading github.com/google/gnostic-models v0.6.8 go: downloading gopkg.in/square/go-jose.v2 v2.6.0 go: downloading github.com/Azure/go-autorest/autorest/to v0.4.0 go: downloading github.com/subosito/gotenv v1.4.2 go: downloading github.com/hashicorp/hcl v1.0.0 go: downloading gopkg.in/ini.v1 v1.67.0 go: downloading github.com/magiconair/properties v1.8.7 go: downloading github.com/pelletier/go-toml/v2 v2.0.8 go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible go: downloading github.com/charmbracelet/bubbles v0.13.0 go: downloading github.com/charmbracelet/bubbletea v0.21.0 go: downloading github.com/charmbracelet/lipgloss v0.5.0 go: downloading github.com/evertras/bubble-table v0.14.4 go: downloading github.com/muesli/termenv v0.11.1-0.20220212125758-44cd13922739 go: downloading github.com/liggitt/tabwriter v0.0.0-20181228230101-89fcab3d43de go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 go: downloading golang.org/x/text v0.13.0 go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible go: downloading sigs.k8s.io/kustomize/api v0.13.5-0.20230601165947-6ce0bf390ce3 go: downloading sigs.k8s.io/kustomize/kyaml v0.14.3-0.20230601165947-6ce0bf390ce3 go: downloading cloud.google.com/go/compute/metadata v0.2.3 go: downloading k8s.io/cloud-provider-gcp/providers v0.27.1 go: downloading github.com/json-iterator/go v1.1.12 go: downloading github.com/docker/distribution v2.8.2+incompatible go: downloading github.com/mitchellh/reflectwalk v1.0.2 go: downloading cloud.google.com/go/compute v1.23.0 go: downloading github.com/containerd/stargz-snapshotter/estargz v0.14.3 go: downloading github.com/moby/term v0.0.0-20221205130635-1aeaba878587 go: downloading github.com/Azure/go-autorest/autorest/adal v0.9.22 go: downloading github.com/Azure/go-autorest/autorest/azure/cli v0.4.5 go: downloading github.com/dimchansky/utfbom v1.1.1 go: downloading github.com/Azure/go-autorest/tracing v0.6.0 go: downloading github.com/Azure/go-autorest/logger v0.2.1 go: downloading google.golang.org/protobuf v1.31.0 go: downloading github.com/moby/sys/mountinfo v0.6.2 go: downloading github.com/prometheus/client_golang v1.16.0 go: downloading github.com/google/go-querystring v1.1.0 go: downloading github.com/hashicorp/go-retryablehttp v0.7.4 go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da go: downloading gopkg.in/warnings.v0 v0.1.2 go: downloading k8s.io/component-helpers v0.28.1 go: downloading github.com/jmespath/go-jmespath v0.4.0 go: downloading k8s.io/apiextensions-apiserver v0.28.0 go: downloading sigs.k8s.io/gateway-api v0.7.0 go: downloading github.com/docker/docker v24.0.5+incompatible go: downloading github.com/sirupsen/logrus v1.9.3 go: downloading github.com/oliveagle/jsonpath v0.0.0-20180606110733-2e52cf6e6852 go: downloading github.com/prometheus/client_model v0.4.0 go: downloading github.com/prometheus/procfs v0.10.1 go: downloading github.com/go-openapi/swag v0.22.3 go: downloading github.com/go-openapi/jsonreference v0.20.2 go: downloading github.com/google/go-cmp v0.5.9 go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230807174057-1744710a1577 go: downloading github.com/davecgh/go-spew v1.1.1 go: downloading github.com/google/btree v1.0.1 go: downloading github.com/containerd/containerd v1.7.5 go: downloading github.com/opencontainers/image-spec v1.1.0-rc4 go: downloading oras.land/oras-go v1.2.4-0.20230829103011-4d0bf161925b go: downloading github.com/klauspost/compress v1.16.5 go: downloading github.com/muesli/reflow v0.3.0 go: downloading github.com/sahilm/fuzzy v0.1.0 go: downloading github.com/atotto/clipboard v0.1.4 go: downloading github.com/mattn/go-runewidth v0.0.13 go: downloading github.com/exponent-io/jsonpath v0.0.0-20151013193312-d6023ce2651d go: downloading github.com/lucasb-eyer/go-colorful v1.2.0 go: downloading github.com/containerd/console v1.0.3 go: downloading github.com/mattn/go-isatty v0.0.17 go: downloading github.com/muesli/ansi v0.0.0-20211018074035-2e021307bc4b go: downloading github.com/muesli/cancelreader v0.2.0 go: downloading github.com/vbatts/tar-split v0.11.3 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.2 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/Azure/go-autorest/autorest/date v0.3.0 go: downloading github.com/golang-jwt/jwt/v4 v4.5.0 go: downloading github.com/docker/docker-credential-helpers v0.8.0 go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 go: downloading github.com/GoogleCloudPlatform/k8s-cloud-provider v1.18.1-0.20220218231025-f11817397a1b go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.2.0 go: downloading github.com/prometheus/common v0.44.0 go: downloading github.com/go-openapi/jsonpointer v0.19.6 go: downloading github.com/mailru/easyjson v0.7.7 go: downloading github.com/docker/go-connections v0.4.0 go: downloading github.com/emicklei/go-restful/v3 v3.10.2 go: downloading github.com/rivo/uniseg v0.2.0 go: downloading github.com/go-errors/errors v1.4.2 go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/moby/locker v1.0.1 go: downloading github.com/moby/spdystream v0.2.0 go: downloading github.com/monochromegane/go-gitignore v0.0.0-20200626010858-205db1a8cc00 go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 go: downloading github.com/xlab/treeprint v1.2.0 go: downloading go.opentelemetry.io/otel v1.15.0 go: downloading go.opentelemetry.io/otel/trace v1.15.0 go: downloading github.com/gorilla/mux v1.8.0 go: downloading github.com/docker/go-units v0.5.0 go: downloading go.starlark.net v0.0.0-20230525235612-a134d8f9ddca go: downloading github.com/docker/go-metrics v0.0.1 go: downloading github.com/morikuni/aec v1.0.0 go: downloading github.com/go-logr/stdr v1.2.2 go: downloading github.com/googleapis/gax-go/v2 v2.12.0 go: downloading github.com/google/s2a-go v0.1.5 go: downloading go.opencensus.io v0.24.0 go: downloading github.com/googleapis/enterprise-certificate-proxy v0.2.5 go: downloading google.golang.org/appengine v1.6.7 go: downloading github.com/Azure/go-autorest/autorest/validation v0.3.1 fatal: not a git repository (or any of the parent directories): .git go test -v ./... go: downloading sigs.k8s.io/controller-runtime v0.16.1 go: downloading github.com/stretchr/testify v1.8.4 go: downloading k8s.io/kubelet v0.28.1 go: downloading github.com/jacksontj/memberlistmesh v0.0.0-20190905163944-93462b9d2bb7 go: downloading github.com/weaveworks/mesh v0.0.0-20191105120815-58dbcc3e8e63 go: downloading github.com/google/go-tpm-tools v0.4.0 go: downloading github.com/google/go-tpm v0.9.0 go: downloading k8s.io/gengo v0.0.0-20230829151522-9cce18d56c01 go: downloading github.com/pmezard/go-difflib v1.0.0 go: downloading golang.org/x/tools v0.12.1-0.20230815132531-74c255bcf846 go: downloading github.com/hashicorp/memberlist v0.3.1 go: downloading github.com/hashicorp/go-sockaddr v1.0.2 go: downloading github.com/oklog/ulid v1.3.1 go: downloading github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529 go: downloading github.com/hashicorp/go-msgpack v0.5.3 go: downloading github.com/hashicorp/go-multierror v1.1.1 go: downloading github.com/miekg/dns v1.1.50 go: downloading github.com/armon/go-metrics v0.4.0 go: downloading github.com/evanphx/json-patch/v5 v5.6.0 go: downloading gomodules.xyz/jsonpatch/v2 v2.4.0 go: downloading github.com/hashicorp/errwrap v1.1.0 go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 go: downloading github.com/google/go-sev-guest v0.6.1 go: downloading github.com/hashicorp/golang-lru v0.5.4 go: downloading github.com/google/logger v1.1.1 go: downloading github.com/pborman/uuid v1.2.0 go: downloading golang.org/x/mod v0.12.0 ? k8s.io/kops [no test files] ? k8s.io/kops/channels/cmd/channels [no test files] ? k8s.io/kops/channels/pkg/api [no test files] ? k8s.io/kops/cloudmock/aws/mockautoscaling [no test files] ? k8s.io/kops/cloudmock/aws/mockec2 [no test files] ? k8s.io/kops/cloudmock/aws/mockelb [no test files] ? k8s.io/kops/cloudmock/aws/mockelbv2 [no test files] ? k8s.io/kops/cloudmock/aws/mockeventbridge [no test files] ? k8s.io/kops/cloudmock/aws/mockiam [no test files] ? k8s.io/kops/cloudmock/aws/mockroute53 [no test files] ? k8s.io/kops/cloudmock/aws/mocksqs [no test files] ? k8s.io/kops/cloudmock/gce [no test files] ? k8s.io/kops/cloudmock/gce/gcphttp [no test files] ? k8s.io/kops/cloudmock/gce/mockcloudresourcemanager [no test files] ? k8s.io/kops/cloudmock/gce/mockiam [no test files] ? k8s.io/kops/cloudmock/gce/mockcompute [no test files] ? k8s.io/kops/cloudmock/gce/mockstorage [no test files] ? k8s.io/kops/cloudmock/openstack [no test files] ? k8s.io/kops/cloudmock/gce/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockblockstorage [no test files] ? k8s.io/kops/cloudmock/openstack/mockcompute [no test files] ? k8s.io/kops/cloudmock/openstack/mockdns [no test files] ? k8s.io/kops/cloudmock/openstack/mockimage [no test files] ? k8s.io/kops/cloudmock/openstack/mockloadbalancer [no test files] ? k8s.io/kops/cloudmock/openstack/mocknetworking [no test files] ? k8s.io/kops/cloudmock/scaleway/mockdns [no test files] === RUN Test_Filtering --- PASS: Test_Filtering (0.00s) === RUN Test_Replacement --- PASS: Test_Replacement (0.00s) === RUN Test_GetRequiredUpdates --- PASS: Test_GetRequiredUpdates (0.00s) === RUN Test_NeedsRollingUpdate I0407 01:57:12.348975 3349 addon.go:250] addon test wants to update all nodes I0407 01:57:12.351060 3349 addon.go:250] addon test wants to update workers nodes I0407 01:57:12.351430 3349 addon.go:250] addon test wants to update control-plane nodes --- PASS: Test_NeedsRollingUpdate (0.00s) === RUN Test_InstallPKI I0407 01:57:12.351805 3349 addon.go:283] installing PKI for "test" I0407 01:57:12.734285 3349 addon.go:283] installing PKI for "test" --- PASS: Test_InstallPKI (0.92s) === RUN Test_IsPKIInstalled --- PASS: Test_IsPKIInstalled (0.01s) PASS ok k8s.io/kops/channels/pkg/channels 0.999s === RUN TestGetUpdates --- PASS: TestGetUpdates (0.00s) PASS ok k8s.io/kops/channels/pkg/cmd 0.065s ? k8s.io/kops/cmd/kops/util [no test files] ? k8s.io/kops/cmd/kops-controller [no test files] ? k8s.io/kops/cmd/kops-controller/controllers [no test files] ? k8s.io/kops/cmd/kops-utils-cp [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/server [no test files] ? k8s.io/kops/cmd/nodeup [no test files] ? k8s.io/kops/cmd/kops-controller/pkg/config [no test files] ? k8s.io/kops/dns-controller/cmd/dns-controller [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/interfaces [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns/internal/stubs [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/rrstype [no test files] ? k8s.io/kops/examples/kops-api-example [no test files] ? k8s.io/kops/dnsprovider/pkg/dnsprovider/tests [no test files] ? k8s.io/kops/nodeup/pkg/model/networking [no test files] ? k8s.io/kops/nodeup/pkg/model/resources [no test files] ? k8s.io/kops/pkg/acls/gce [no test files] ? k8s.io/kops/pkg/acls [no test files] ? k8s.io/kops/pkg/apis/kops/registry [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/apis/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/apis/nodeup [no test files] ? k8s.io/kops/pkg/applylib [no test files] ? k8s.io/kops/pkg/applylib/mocks [no test files] ? k8s.io/kops/pkg/applylib/mocks/mockkubeapiserver [no test files] ? k8s.io/kops/pkg/bootstrap [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/clientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/scheme [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/internalversion/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha2/fake [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3 [no test files] ? k8s.io/kops/pkg/client/clientset_generated/internalclientset/typed/kops/v1alpha3/fake [no test files] ? k8s.io/kops/pkg/client/simple [no test files] ? k8s.io/kops/pkg/client/simple/api [no test files] ? k8s.io/kops/pkg/clouds [no test files] ? k8s.io/kops/pkg/clusteraddons [no test files] ? k8s.io/kops/pkg/commands/commandutils [no test files] ? k8s.io/kops/pkg/configserver [no test files] ? k8s.io/kops/pkg/dump [no test files] ? k8s.io/kops/pkg/kopscontrollerclient [no test files] ? k8s.io/kops/pkg/kubemanifest [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awscloudcontrollermanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsebscsidriver [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/awsloadbalancercontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/certmanager [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/clusterautoscaler [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/dnscontroller [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/externaldns [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/karpenter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/kuberouter [no test files] ? k8s.io/kops/pkg/model/components/addonmanifests/nodeterminationhandler [no test files] ? k8s.io/kops/pkg/model/components/kopscontroller [no test files] ? k8s.io/kops/pkg/model/domodel [no test files] ? k8s.io/kops/pkg/model/gcemodel [no test files] ? k8s.io/kops/pkg/model/hetznermodel [no test files] ? k8s.io/kops/pkg/model/scalewaymodel [no test files] ? k8s.io/kops/pkg/mutexes [no test files] ? k8s.io/kops/pkg/nodeidentity [no test files] ? k8s.io/kops/pkg/nodeidentity/aws [no test files] ? k8s.io/kops/pkg/nodeidentity/do [no test files] ? k8s.io/kops/pkg/nodeidentity/gce [no test files] ? k8s.io/kops/pkg/nodeidentity/hetzner [no test files] ? k8s.io/kops/pkg/nodeidentity/openstack [no test files] ? k8s.io/kops/pkg/nodeidentity/scaleway [no test files] ? k8s.io/kops/pkg/rbac [no test files] ? k8s.io/kops/pkg/resolver [no test files] ? k8s.io/kops/pkg/resources [no test files] ? k8s.io/kops/pkg/resources/digitalocean [no test files] ? k8s.io/kops/pkg/resources/hetzner [no test files] ? k8s.io/kops/pkg/resources/openstack [no test files] ? k8s.io/kops/pkg/resources/ops [no test files] ? k8s.io/kops/pkg/sshcredentials [no test files] ? k8s.io/kops/pkg/resources/spotinst [no test files] ? k8s.io/kops/pkg/templates [no test files] ? k8s.io/kops/pkg/tokens [no test files] ? k8s.io/kops/pkg/testutils/golden [no test files] ? k8s.io/kops/pkg/testutils [no test files] ? k8s.io/kops/pkg/testutils/testcontext [no test files] ? k8s.io/kops/pkg/resources/scaleway [no test files] ? k8s.io/kops/pkg/try [no test files] ? k8s.io/kops/pkg/values [no test files] ? k8s.io/kops/pkg/wellknownports [no test files] ? k8s.io/kops/pkg/wellknownusers [no test files] ? k8s.io/kops/pkg/wellknownoperators [no test files] ? k8s.io/kops/pkg/zones [no test files] ? k8s.io/kops/proto/kops/bootstrap/v1 [no test files] ? k8s.io/kops/protokube/cmd/protokube [no test files] ? k8s.io/kops/protokube/pkg/etcd [no test files] ? k8s.io/kops/protokube/pkg/gossip [no test files] ? k8s.io/kops/protokube/pkg/gossip/aws [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns [no test files] ? k8s.io/kops/protokube/pkg/gossip/dns/provider [no test files] ? k8s.io/kops/protokube/pkg/gossip/do [no test files] ? k8s.io/kops/protokube/pkg/gossip/hetzner [no test files] ? k8s.io/kops/protokube/pkg/gossip/memberlist [no test files] ? k8s.io/kops/protokube/pkg/gossip/mesh [no test files] ? k8s.io/kops/protokube/pkg/gossip/openstack [no test files] ? k8s.io/kops/protokube/pkg/gossip/scaleway [no test files] ? k8s.io/kops/protokube/pkg/protokube [no test files] ? k8s.io/kops/tests/fuzz [no test files] ? k8s.io/kops/tests/integration/channel/simple [no test files] ? k8s.io/kops/upup/models [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/bootstrapchannelbuilder [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcediscovery [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/gcemetadata [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/do [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmsigner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/gce/tpm/gcetpmverifier [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetzner [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/hetznertasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/scalewaytasks [no test files] ? k8s.io/kops/upup/pkg/fi/cloudup/spotinsttasks [no test files] ? k8s.io/kops/upup/pkg/fi/loader [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/install [no test files] ? k8s.io/kops/upup/pkg/fi/nodeup/local [no test files] ? k8s.io/kops/upup/pkg/fi/secrets [no test files] ? k8s.io/kops/upup/tools/generators/fitask [no test files] ? k8s.io/kops/util/pkg/architectures [no test files] ? k8s.io/kops/util/pkg/env [no test files] ? k8s.io/kops/util/pkg/mirrors [no test files] ? k8s.io/kops/util/pkg/tables [no test files] ? k8s.io/kops/util/pkg/ui [no test files] === RUN TestCreateClusterMinimal I0407 01:57:24.369554 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.369809 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.369918 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.370018 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.370093 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.370254 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.370314 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.370344 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.370391 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.370429 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.377246 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.377318 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.441372 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.441606 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.442015 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.454386 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.454468 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.454497 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.454529 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.454552 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.454589 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.454615 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.454631 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.454654 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.454671 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.458257 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.458295 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.509784 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.509971 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.510269 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.515584 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.515656 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.515683 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.515714 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.515738 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.515769 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.515795 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.515812 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.515836 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.515853 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.589538 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.589619 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.637304 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.637474 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.637772 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.643050 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.643120 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.643146 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.643177 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.643201 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.643232 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.643260 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.643277 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.643301 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.643318 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.647225 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.647276 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.674084 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.674314 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.674625 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.680643 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.680768 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.680811 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.680856 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.680893 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.680942 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.680986 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.681015 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.681051 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.681076 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.689525 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.689618 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.773519 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.773689 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.773978 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.781563 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.781645 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.781676 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.781714 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.781777 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.781814 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.781843 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.781860 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.781899 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.781918 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.786152 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.786210 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.844716 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.844830 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.845148 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:24.850571 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.850647 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.850673 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.850703 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.850729 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.850764 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.850793 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.850810 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.850834 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.850853 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.854879 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.854921 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.911948 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:24.912128 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:24.912487 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterMinimal (0.55s) === RUN TestCreateClusterHetzner I0407 01:57:24.918224 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.918330 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.918356 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.918388 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.918427 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.918459 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.918486 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.918503 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.918526 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.918543 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.922111 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.922157 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:24.969596 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:24.969654 6053 new_cluster.go:1373] Cloud Provider ID: "hetzner" I0407 01:57:24.976135 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:24.976237 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:24.976270 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:24.976312 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:24.976342 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:24.976375 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:24.976404 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:24.976422 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:24.976445 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:24.976462 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:24.980257 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:24.980334 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.004733 6053 new_cluster.go:1373] Cloud Provider ID: "hetzner" --- PASS: TestCreateClusterHetzner (0.09s) === RUN TestCreateClusterOpenStack I0407 01:57:25.010078 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.010162 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.010191 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.010219 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.010243 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.010275 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.010303 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.010321 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.010344 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.010361 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.014145 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.014199 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:25.068702 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:25.068747 6053 new_cluster.go:1373] Cloud Provider ID: "openstack" I0407 01:57:25.071132 6053 subnets.go:224] Assigned CIDR 10.0.0.0/16 to subnet us-test1 --- PASS: TestCreateClusterOpenStack (0.07s) === RUN TestCreateClusterOpenStackOctavia I0407 01:57:25.078535 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.078631 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.078660 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.078691 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.078714 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.078746 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.078773 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.078791 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.078815 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.078833 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.082600 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.082648 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:25.113676 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:25.113725 6053 new_cluster.go:1373] Cloud Provider ID: "openstack" I0407 01:57:25.115901 6053 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0407 01:57:25.115922 6053 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackOctavia (0.05s) === RUN TestCreateClusterOpenStackNoDNS I0407 01:57:25.125705 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.125791 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.125821 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.125853 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.125880 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.125914 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.125943 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.125960 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.125985 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.126004 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.174175 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.174287 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:25.262925 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:25.263004 6053 new_cluster.go:1373] Cloud Provider ID: "openstack" I0407 01:57:25.263080 6053 subnets.go:205] Assigned CIDR 10.0.0.0/20 to subnet utility-us-test1 I0407 01:57:25.263109 6053 subnets.go:224] Assigned CIDR 10.0.128.0/17 to subnet us-test1 --- PASS: TestCreateClusterOpenStackNoDNS (0.15s) === RUN TestCreateClusterCilium I0407 01:57:25.272072 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.272165 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.272195 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.272224 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.272248 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.272280 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.272307 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.272324 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.272348 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.272366 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.276272 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.276341 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.331583 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.331766 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:25.332074 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterCilium (0.07s) === RUN TestCreateClusterOverride I0407 01:57:25.337706 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.337792 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.337818 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.337849 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.337875 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.337907 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.337933 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.337949 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.337973 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.337990 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.341974 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.342038 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.367108 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.367636 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:25.367922 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterOverride (0.04s) === RUN TestCreateClusterKubernetesFeatureGates I0407 01:57:25.375525 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.375613 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.375644 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.375675 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.375699 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.375732 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.375757 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.375772 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.375794 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.375811 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.380161 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.380207 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.410409 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.410577 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:25.410938 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKubernetesFeatureGates (0.04s) === RUN TestCreateClusterComplex I0407 01:57:25.417344 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.417445 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.417480 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.417527 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.417560 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.417609 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.417645 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.417672 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.417712 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.417738 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.421784 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.421847 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.535849 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.536179 6053 subnets.go:224] Assigned CIDR 10.0.0.0/18 to subnet us-test-1a I0407 01:57:25.536196 6053 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1b I0407 01:57:25.536205 6053 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1c I0407 01:57:25.536574 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplex (0.13s) === RUN TestCreateClusterComplexPrivate I0407 01:57:25.546317 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.546404 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.546431 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.546459 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.546484 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.546518 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.546545 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.546560 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.546583 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.546600 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.551047 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.551125 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.620023 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.620391 6053 subnets.go:205] Assigned CIDR 10.0.0.0/21 to subnet utility-us-test-1a I0407 01:57:25.620407 6053 subnets.go:205] Assigned CIDR 10.0.8.0/21 to subnet utility-us-test-1a-1 I0407 01:57:25.620416 6053 subnets.go:205] Assigned CIDR 10.0.16.0/21 to subnet utility-us-test-1a-4 I0407 01:57:25.620424 6053 subnets.go:205] Assigned CIDR 10.0.24.0/21 to subnet utility-us-test-1b I0407 01:57:25.620434 6053 subnets.go:205] Assigned CIDR 10.0.32.0/21 to subnet utility-us-test-1b-2 I0407 01:57:25.620441 6053 subnets.go:205] Assigned CIDR 10.0.40.0/21 to subnet utility-us-test-1c I0407 01:57:25.620448 6053 subnets.go:205] Assigned CIDR 10.0.48.0/21 to subnet utility-us-test-1c-3 I0407 01:57:25.620460 6053 subnets.go:224] Assigned CIDR 10.0.64.0/18 to subnet us-test-1a I0407 01:57:25.620470 6053 subnets.go:224] Assigned CIDR 10.0.128.0/18 to subnet us-test-1b I0407 01:57:25.620478 6053 subnets.go:224] Assigned CIDR 10.0.192.0/18 to subnet us-test-1c I0407 01:57:25.620944 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterComplexPrivate (0.09s) === RUN TestCreateClusterHA I0407 01:57:25.632937 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.633027 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.633053 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.633085 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.633109 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.633144 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.633171 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.633187 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.633212 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.633230 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.637636 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.637718 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.687270 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.687861 6053 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0407 01:57:25.687884 6053 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0407 01:57:25.687907 6053 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0407 01:57:25.688392 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.704056 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.704170 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.704216 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.704262 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.704303 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.704355 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.704398 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.704433 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.704474 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.704501 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.708775 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.708830 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.737961 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:25.738291 6053 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0407 01:57:25.738306 6053 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0407 01:57:25.738315 6053 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0407 01:57:25.738666 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHA (0.12s) === RUN TestCreateClusterMinimalGCE I0407 01:57:25.749772 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.749861 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.749893 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.749926 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.749950 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.749983 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.750010 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.750028 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.750053 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.750071 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.753519 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.753581 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.813991 6053 new_cluster.go:1373] Cloud Provider ID: "gce" I0407 01:57:25.814152 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 I0407 01:57:25.822743 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.822813 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.822844 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.822876 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.822899 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.822929 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.822955 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.822971 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.822996 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.823014 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.826379 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.826429 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.893214 6053 new_cluster.go:1373] Cloud Provider ID: "gce" I0407 01:57:25.893305 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterMinimalGCE (0.15s) === RUN TestCreateClusterHAGCE I0407 01:57:25.900940 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.901047 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.901088 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.901136 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.901175 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.901221 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.901260 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.901290 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.901327 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.901355 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.905013 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.905054 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.929430 6053 new_cluster.go:1373] Cloud Provider ID: "gce" I0407 01:57:25.929560 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterHAGCE (0.04s) === RUN TestCreateClusterGCE I0407 01:57:25.937956 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.938039 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.938066 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.938095 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.938119 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.938149 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.938188 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.938208 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.938235 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.938253 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.941282 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:25.941320 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.004270 6053 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0407 01:57:26.004374 6053 new_cluster.go:1373] Cloud Provider ID: "gce" I0407 01:57:26.004484 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterGCE (0.08s) === RUN TestCreateClusterHASharedZone I0407 01:57:26.013778 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.013898 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.013940 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.013986 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.014021 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.014069 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.014107 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.014135 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.014170 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.014200 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.020237 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.020319 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:26.062050 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:26.062107 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.062482 6053 subnets.go:224] Assigned CIDR 172.20.0.0/16 to subnet us-test-1a I0407 01:57:26.062947 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZone (0.06s) === RUN TestCreateClusterHASharedZones I0407 01:57:26.074385 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.074494 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.074531 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.074567 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.074595 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.074640 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.074674 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.074695 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.074724 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.074744 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.080119 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.080191 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } W0407 01:57:26.149434 6053 new_cluster.go:947] Running with control-plane nodes in the same AZs; redundancy will be reduced I0407 01:57:26.149487 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.149842 6053 subnets.go:224] Assigned CIDR 172.20.0.0/17 to subnet us-test-1a I0407 01:57:26.149857 6053 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1b I0407 01:57:26.150198 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterHASharedZones (0.09s) === RUN TestCreateClusterPrivate I0407 01:57:26.159824 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.159924 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.159950 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.159980 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.160006 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.160039 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.160067 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.160084 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.160108 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.160125 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.164676 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.164743 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.247536 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.247742 6053 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0407 01:57:26.247761 6053 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0407 01:57:26.248051 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:26.248082 6053 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterPrivate (0.09s) === RUN TestCreateClusterPrivateGCE I0407 01:57:26.254625 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.254704 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.254729 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.254757 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.254780 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.254812 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.254839 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.254857 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.254881 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.254897 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.258828 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.258874 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.323373 6053 new_cluster.go:581] VMs will be configured to use specified Service Account: test-account@testproject.iam.gserviceaccount.com I0407 01:57:26.323448 6053 new_cluster.go:1373] Cloud Provider ID: "gce" I0407 01:57:26.323546 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 --- PASS: TestCreateClusterPrivateGCE (0.08s) === RUN TestCreateClusterWithNGWSpecified I0407 01:57:26.330109 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.330193 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.330221 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.330252 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.330278 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.330309 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.330336 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.330353 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.330376 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.330393 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.335613 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.335677 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.399983 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.400204 6053 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0407 01:57:26.400224 6053 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0407 01:57:26.400516 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:26.400549 6053 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithNGWSpecified (0.08s) === RUN TestCreateClusterWithINGWSpecified I0407 01:57:26.407398 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.407483 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.407509 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.407538 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.407565 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.407599 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.407625 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.407642 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.407668 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.407689 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.412376 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.412415 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.437479 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.437704 6053 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0407 01:57:26.437723 6053 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0407 01:57:26.438045 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:26.438077 6053 utils.go:230] Found matching hosted zone ".private.example.com", but it was "Private" and we require "Public" --- PASS: TestCreateClusterWithINGWSpecified (0.04s) === RUN TestCreateClusterSharedVPC I0407 01:57:26.450484 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.450640 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.450687 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.450742 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.450783 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.450836 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.450883 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.450911 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.450951 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.450980 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.457498 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.457570 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.526156 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.526332 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.526388 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.526431 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.526450 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.526497 6053 subnets.go:224] Assigned CIDR 10.0.0.0/12 to subnet us-test-1a I0407 01:57:26.526814 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedVPC (0.08s) === RUN TestCreateClusterSharedSubnets I0407 01:57:26.532712 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.532801 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.532828 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.532855 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.532878 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.532911 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.532938 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.532955 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.532979 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.532996 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.538289 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.538369 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.593306 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.593362 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.593466 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.593647 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.593676 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.593704 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.593725 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.594096 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnets (0.07s) === RUN TestCreateClusterSharedSubnetsVpcLookup I0407 01:57:26.600955 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.601052 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.601081 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.601112 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.601142 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.601181 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.601213 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.601234 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.601261 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.601281 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.606565 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.606630 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.699858 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:57:26.699914 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.699937 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.700015 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.700160 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.700180 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.700201 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.700215 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.700528 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterSharedSubnetsVpcLookup (0.10s) === RUN TestCreateClusterPrivateSharedSubnets I0407 01:57:26.706021 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.706105 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.706132 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.706160 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.706182 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.706213 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.706238 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.706254 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.706279 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.706297 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.712159 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.712203 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.732804 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.732848 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.732899 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.732917 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.732976 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.733107 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.733128 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.733150 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:57:26.733166 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:57:26.733482 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterPrivateSharedSubnets (0.04s) === RUN TestCreateClusterIPv6 I0407 01:57:26.744778 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.744923 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.744969 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.745016 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.745056 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.745128 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.745173 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.745201 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.745240 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.745269 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.751340 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.751419 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.805526 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.805794 6053 subnets.go:205] Assigned CIDR 172.20.0.0/21 to subnet utility-us-test-1a I0407 01:57:26.805824 6053 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet dualstack-us-test-1a I0407 01:57:26.806466 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterIPv6 (0.07s) === RUN TestCreateClusterDifferentAMIs I0407 01:57:26.814405 6053 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0407 01:57:26.814419 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.814499 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.814527 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.814555 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.814584 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.814619 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.814646 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.814666 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.814692 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.814709 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.820335 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.820413 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.886245 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.886314 6053 subnets.go:205] Assigned CIDR 172.20.0.0/20 to subnet utility-us-test-1a I0407 01:57:26.886334 6053 subnets.go:224] Assigned CIDR 172.20.128.0/17 to subnet us-test-1a I0407 01:57:26.886587 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:26.894115 6053 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestCreateClusterDifferentAMIs (0.08s) === RUN TestCreateClusterKarpenter I0407 01:57:26.894174 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.894242 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.894267 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.894292 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.894315 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.894347 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.894372 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.894392 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.894414 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.894431 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.898679 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.10.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.898723 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.11.0.0/24", VpcId: "vpc-12345678" } I0407 01:57:26.979392 6053 new_cluster.go:1373] Cloud Provider ID: "aws" I0407 01:57:26.979556 6053 subnets.go:224] Assigned CIDR 172.20.0.0/18 to subnet us-test-1a I0407 01:57:26.979572 6053 subnets.go:224] Assigned CIDR 172.20.64.0/18 to subnet us-test-1b I0407 01:57:26.979580 6053 subnets.go:224] Assigned CIDR 172.20.128.0/18 to subnet us-test-1c I0407 01:57:26.979860 6053 zones.go:93] ListHostedZonesPages { } --- PASS: TestCreateClusterKarpenter (0.09s) === RUN TestParseCloudLabels --- PASS: TestParseCloudLabels (0.00s) === RUN TestConfirmation --- PASS: TestConfirmation (0.00s) === RUN TestEditInstanceGroup I0407 01:57:26.985728 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.985794 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.985819 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.985881 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.985905 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.985934 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.985958 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.985976 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.985998 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.986016 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:26.991104 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } --- PASS: TestEditInstanceGroup (0.01s) === RUN TestMinimal I0407 01:57:26.993059 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:26.993209 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:26.993254 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:26.993301 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:26.993351 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:26.993406 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:26.993448 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:26.993487 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:26.993525 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:26.993559 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:27.009025 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:57:27.010886 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:27.010953 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:57:32.141317 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:35.462859 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:57:35.464276 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:35.464302 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:35.464419 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:35.466989 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:57:35.472057 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:57:35.472935 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:35.473366 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:35.473535 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:35.473973 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:35.474065 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:57:35.474460 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:57:35.474900 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:57:35.478035 6053 target.go:111] Terraform output is in /tmp/test2103862047/out --- PASS: TestMinimal (8.49s) === RUN TestMinimal_v1_23 I0407 01:57:35.484524 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:35.484636 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:35.484671 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:35.484704 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:35.484731 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:35.484767 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:35.484799 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:35.484816 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:35.484847 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:35.484866 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:35.501957 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0407 01:57:35.505158 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:35.505250 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.681359 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:37.791661 6053 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0407 01:57:37.792198 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:37.792231 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:37.792312 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:37.794127 6053 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0407 01:57:37.800450 6053 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0407 01:57:37.800787 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.800976 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.801338 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.801521 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.801618 6053 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0407 01:57:37.801885 6053 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0407 01:57:37.802117 6053 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0407 01:57:37.805170 6053 target.go:111] Terraform output is in /tmp/test3122636528/out --- PASS: TestMinimal_v1_23 (2.33s) === RUN TestMinimal_v1_24 I0407 01:57:37.810461 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:37.810571 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:37.810610 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:37.810645 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:37.810679 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:37.810716 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:37.810746 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:37.810764 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:37.810790 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:37.810807 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:37.829823 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:57:37.833340 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:37.833439 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.753930 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:39.906505 6053 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0407 01:57:39.907420 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:39.907450 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:39.907539 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:39.908797 6053 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0407 01:57:39.912280 6053 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0407 01:57:39.912542 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.912688 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.912981 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.913035 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.913095 6053 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0407 01:57:39.913278 6053 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0407 01:57:39.913458 6053 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0407 01:57:39.921493 6053 target.go:111] Terraform output is in /tmp/test2017069952/out --- PASS: TestMinimal_v1_24 (2.12s) === RUN TestMinimal_v1_25 I0407 01:57:39.926139 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:39.926304 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:39.926392 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:39.926487 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:39.926569 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:39.926624 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:39.926667 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:39.926698 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:39.926740 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:39.926772 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:39.952952 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:57:39.956122 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:39.956212 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:41.979918 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:42.082395 6053 executor.go:111] Tasks: 0 done / 105 total; 46 can run I0407 01:57:42.083221 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:42.083247 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:42.083300 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:42.084735 6053 executor.go:111] Tasks: 46 done / 105 total; 23 can run I0407 01:57:42.089015 6053 executor.go:111] Tasks: 69 done / 105 total; 28 can run I0407 01:57:42.090669 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:42.090843 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:42.091134 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:42.091178 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:42.091261 6053 executor.go:111] Tasks: 97 done / 105 total; 2 can run I0407 01:57:42.091458 6053 executor.go:111] Tasks: 99 done / 105 total; 6 can run I0407 01:57:42.091592 6053 executor.go:111] Tasks: 105 done / 105 total; 0 can run I0407 01:57:42.094693 6053 target.go:111] Terraform output is in /tmp/test734252241/out --- PASS: TestMinimal_v1_25 (2.17s) === RUN TestMinimal_v1_26 I0407 01:57:42.097380 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:42.097465 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:42.097496 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:42.097527 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:42.097553 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:42.097587 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:42.097614 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:42.097630 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:42.097653 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:42.097669 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:42.112235 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:57:42.114100 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:42.114156 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.246543 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:44.373037 6053 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0407 01:57:44.374077 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:44.374101 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:44.374169 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:44.378872 6053 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0407 01:57:44.383192 6053 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0407 01:57:44.383569 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.383710 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.383914 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.384246 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.384315 6053 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0407 01:57:44.384504 6053 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0407 01:57:44.384718 6053 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0407 01:57:44.387742 6053 target.go:111] Terraform output is in /tmp/test3773902444/out --- PASS: TestMinimal_v1_26 (2.29s) === RUN TestMinimal_v1_27 I0407 01:57:44.390423 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:44.390500 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:44.390530 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:44.390563 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:44.390589 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:44.390624 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:44.390651 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:44.390668 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:44.390693 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:44.390709 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:44.405546 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:57:44.407428 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:44.407487 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.171268 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:47.260422 6053 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0407 01:57:47.265659 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:47.266558 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:47.266652 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:47.267675 6053 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0407 01:57:47.273616 6053 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0407 01:57:47.274111 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.274403 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.274755 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.274824 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.274888 6053 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0407 01:57:47.275216 6053 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0407 01:57:47.275617 6053 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0407 01:57:47.280838 6053 target.go:111] Terraform output is in /tmp/test3788556615/out --- PASS: TestMinimal_v1_27 (2.89s) === RUN TestMinimal_NoneDNS I0407 01:57:47.285419 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:47.285546 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:47.285588 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:47.285633 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:47.285673 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:47.285723 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:47.285763 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:47.285793 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:47.285830 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:47.285858 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:57:47.315853 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:47.315940 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:48.800610 6053 executor.go:111] Tasks: 0 done / 110 total; 43 can run I0407 01:57:48.807560 6053 executor.go:111] Tasks: 43 done / 110 total; 24 can run I0407 01:57:48.811165 6053 executor.go:111] Tasks: 67 done / 110 total; 29 can run I0407 01:57:48.811852 6053 executor.go:111] Tasks: 96 done / 110 total; 2 can run I0407 01:57:48.811910 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:57:48.811999 6053 loadbalancers.go:35] PageSize not implemented I0407 01:57:48.812150 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:57:48.812259 6053 loadbalancers.go:35] PageSize not implemented I0407 01:57:48.817947 6053 executor.go:111] Tasks: 98 done / 110 total; 4 can run I0407 01:57:48.818146 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:48.818329 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:48.818500 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:48.819104 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:48.819224 6053 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0407 01:57:48.819600 6053 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0407 01:57:48.819953 6053 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0407 01:57:48.825412 6053 target.go:111] Terraform output is in /tmp/test1580127513/out --- PASS: TestMinimal_NoneDNS (1.54s) === RUN TestHetzner I0407 01:57:48.829882 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:57:50.879709 6053 executor.go:111] Tasks: 0 done / 46 total; 37 can run I0407 01:57:50.883271 6053 executor.go:111] Tasks: 37 done / 46 total; 3 can run I0407 01:57:50.883583 6053 executor.go:111] Tasks: 40 done / 46 total; 2 can run I0407 01:57:50.889107 6053 executor.go:111] Tasks: 42 done / 46 total; 4 can run I0407 01:57:50.892358 6053 executor.go:111] Tasks: 46 done / 46 total; 0 can run I0407 01:57:50.896139 6053 target.go:111] Terraform output is in /tmp/test495323424/out --- PASS: TestHetzner (2.07s) === RUN TestNvidia I0407 01:57:50.899128 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:50.899274 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:50.899318 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:50.899377 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:50.899427 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:50.899476 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:50.899520 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:50.899551 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:50.899591 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:50.899618 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:50.927139 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:57:50.929223 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:50.929288 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:52.925827 6053 zones.go:93] ListHostedZonesPages { } I0407 01:57:53.042906 6053 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0407 01:57:53.045155 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:57:53.045199 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:57:53.045294 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:57:53.049939 6053 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0407 01:57:53.055260 6053 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0407 01:57:53.055545 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:53.055765 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:53.056104 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:53.056195 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:53.056298 6053 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0407 01:57:53.056527 6053 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0407 01:57:53.056725 6053 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0407 01:57:53.059742 6053 target.go:111] Terraform output is in /tmp/test2217319131/out --- PASS: TestNvidia (2.16s) === RUN TestMinimalGossip I0407 01:57:53.062506 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:53.062583 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:53.062611 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:53.062639 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:53.062662 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:53.062694 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:53.062722 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:53.062738 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:53.062761 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:53.062778 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:57:53.078251 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:53.078317 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.510675 6053 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0407 01:57:54.516571 6053 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0407 01:57:54.519757 6053 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0407 01:57:54.520073 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.520232 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.520376 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.520534 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.520598 6053 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0407 01:57:54.520773 6053 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0407 01:57:54.520954 6053 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0407 01:57:54.523996 6053 target.go:111] Terraform output is in /tmp/test2557981247/out --- PASS: TestMinimalGossip (1.46s) === RUN TestMinimalGossipIRSA I0407 01:57:54.526634 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:54.526718 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:54.526748 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:54.526777 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:54.526802 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:54.526835 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:54.526865 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:54.526881 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:54.526904 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:54.526921 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:57:54.543085 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:54.543146 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:55.960270 6053 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0407 01:57:55.962242 6053 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0407 01:57:55.965844 6053 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0407 01:57:55.966071 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:55.966815 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:55.967045 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:55.967385 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:57:55.967620 6053 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0407 01:57:55.968199 6053 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0407 01:57:55.968699 6053 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0407 01:57:55.972127 6053 target.go:111] Terraform output is in /tmp/test2000061283/out --- PASS: TestMinimalGossipIRSA (1.45s) === RUN TestMinimalGCE I0407 01:57:55.974616 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:55.975523 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:57:57.970229 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:57:57.970300 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:57:57.970374 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0407 01:57:57.970394 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0407 01:57:57.970408 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0407 01:57:57.970462 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:57:57.971400 6053 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0407 01:57:57.973492 6053 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0407 01:57:57.976630 6053 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0407 01:57:57.977294 6053 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0407 01:57:57.977458 6053 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0407 01:57:57.981935 6053 target.go:111] Terraform output is in /tmp/test1384176321/out --- PASS: TestMinimalGCE (2.01s) === RUN TestMinimalGCEPrivate I0407 01:57:57.983855 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:57.985228 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:57:59.685368 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:57:59.685450 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:57:59.685542 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/main" W0407 01:57:59.685559 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com/backups/etcd/events" W0407 01:57:59.685574 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-private.example.com" W0407 01:57:59.685619 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:57:59.686534 6053 executor.go:111] Tasks: 0 done / 65 total; 41 can run I0407 01:57:59.688577 6053 executor.go:111] Tasks: 41 done / 65 total; 17 can run I0407 01:57:59.691819 6053 executor.go:111] Tasks: 58 done / 65 total; 5 can run I0407 01:57:59.692480 6053 executor.go:111] Tasks: 63 done / 65 total; 2 can run I0407 01:57:59.692631 6053 executor.go:111] Tasks: 65 done / 65 total; 0 can run I0407 01:57:59.695622 6053 target.go:111] Terraform output is in /tmp/test3588456256/out --- PASS: TestMinimalGCEPrivate (1.71s) === RUN TestMinimalGCEInternalLoadBalancer I0407 01:57:59.698603 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:59.700251 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:01.418766 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:01.418850 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:01.418995 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/main" W0407 01:58:01.419020 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com/backups/etcd/events" W0407 01:58:01.419044 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-ilb.example.com" W0407 01:58:01.419109 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0407 01:58:01.419157 6053 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0407 01:58:01.420950 6053 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0407 01:58:01.425628 6053 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0407 01:58:01.426806 6053 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0407 01:58:01.427117 6053 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0407 01:58:01.431696 6053 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0407 01:58:01.432294 6053 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0407 01:58:01.432416 6053 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0407 01:58:01.432573 6053 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0407 01:58:01.432730 6053 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0407 01:58:01.434760 6053 target.go:111] Terraform output is in /tmp/test2711595509/out --- PASS: TestMinimalGCEInternalLoadBalancer (1.74s) === RUN TestMinimalGCEPublicLoadBalancer I0407 01:58:01.436788 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:01.437897 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:03.129579 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:03.129635 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:03.129724 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/main" W0407 01:58:03.129740 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com/backups/etcd/events" W0407 01:58:03.129755 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-plb.example.com" W0407 01:58:03.129796 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:58:03.130849 6053 executor.go:111] Tasks: 0 done / 71 total; 43 can run I0407 01:58:03.139750 6053 executor.go:111] Tasks: 43 done / 71 total; 19 can run I0407 01:58:03.145484 6053 executor.go:111] Tasks: 62 done / 71 total; 7 can run I0407 01:58:03.146585 6053 executor.go:111] Tasks: 69 done / 71 total; 2 can run I0407 01:58:03.146792 6053 executor.go:111] Tasks: 71 done / 71 total; 0 can run I0407 01:58:03.148961 6053 target.go:111] Terraform output is in /tmp/test1668758097/out --- PASS: TestMinimalGCEPublicLoadBalancer (1.71s) === RUN TestMinimalGCELongClusterName I0407 01:58:03.150900 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:03.152040 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:04.808135 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:04.808231 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:04.808324 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0407 01:58:04.808344 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0407 01:58:04.808360 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0407 01:58:04.808424 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:58:04.809352 6053 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0407 01:58:04.812905 6053 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0407 01:58:04.818804 6053 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0407 01:58:04.820456 6053 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0407 01:58:04.820765 6053 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0407 01:58:04.824911 6053 target.go:111] Terraform output is in /tmp/test1971935732/out --- PASS: TestMinimalGCELongClusterName (1.68s) === RUN TestMinimalGCEInternalLoadBalancerLongClusterName I0407 01:58:04.827005 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:04.828223 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:06.584231 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:06.584300 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:06.584410 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/main" W0407 01:58:06.584432 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com/backups/etcd/events" W0407 01:58:06.584447 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce-with-a-very-very-very-very-very-long-name.example.com" W0407 01:58:06.584492 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0407 01:58:06.584527 6053 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0407 01:58:06.585567 6053 executor.go:111] Tasks: 0 done / 70 total; 42 can run I0407 01:58:06.590817 6053 executor.go:111] Tasks: 42 done / 70 total; 16 can run I0407 01:58:06.591820 6053 executor.go:111] Tasks: 58 done / 70 total; 2 can run I0407 01:58:06.592612 6053 executor.go:111] Tasks: 60 done / 70 total; 2 can run I0407 01:58:06.596539 6053 executor.go:111] Tasks: 62 done / 70 total; 4 can run I0407 01:58:06.597191 6053 executor.go:111] Tasks: 66 done / 70 total; 2 can run I0407 01:58:06.597368 6053 executor.go:111] Tasks: 68 done / 70 total; 1 can run I0407 01:58:06.597526 6053 executor.go:111] Tasks: 69 done / 70 total; 1 can run I0407 01:58:06.597687 6053 executor.go:111] Tasks: 70 done / 70 total; 0 can run I0407 01:58:06.601223 6053 target.go:111] Terraform output is in /tmp/test2979077484/out --- PASS: TestMinimalGCEInternalLoadBalancerLongClusterName (1.78s) === RUN TestMinimalGCEDNSNone I0407 01:58:06.604718 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:06.606539 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:08.287539 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:08.287593 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:08.287687 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0407 01:58:08.287705 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0407 01:58:08.287719 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0407 01:58:08.287757 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0407 01:58:08.287784 6053 autoscalinggroup.go:321] Not hooking the instance group manager up to anything. I0407 01:58:08.288856 6053 executor.go:111] Tasks: 0 done / 72 total; 41 can run I0407 01:58:08.291511 6053 executor.go:111] Tasks: 41 done / 72 total; 18 can run I0407 01:58:08.291933 6053 executor.go:111] Tasks: 59 done / 72 total; 2 can run I0407 01:58:08.292109 6053 executor.go:111] Tasks: 61 done / 72 total; 2 can run I0407 01:58:08.297101 6053 executor.go:111] Tasks: 63 done / 72 total; 4 can run I0407 01:58:08.299292 6053 executor.go:111] Tasks: 67 done / 72 total; 2 can run I0407 01:58:08.299626 6053 executor.go:111] Tasks: 69 done / 72 total; 1 can run I0407 01:58:08.299837 6053 executor.go:111] Tasks: 70 done / 72 total; 2 can run I0407 01:58:08.300169 6053 executor.go:111] Tasks: 72 done / 72 total; 0 can run I0407 01:58:08.304737 6053 target.go:111] Terraform output is in /tmp/test2163514117/out --- PASS: TestMinimalGCEDNSNone (1.70s) === RUN TestMinimalScaleway I0407 01:58:08.307529 6053 featureflag.go:164] FeatureFlag "Scaleway"=true I0407 01:58:08.307548 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:10.445239 6053 executor.go:111] Tasks: 0 done / 49 total; 37 can run I0407 01:58:10.448130 6053 executor.go:111] Tasks: 37 done / 49 total; 6 can run I0407 01:58:10.453532 6053 executor.go:111] Tasks: 43 done / 49 total; 6 can run I0407 01:58:10.454455 6053 executor.go:111] Tasks: 49 done / 49 total; 0 can run I0407 01:58:10.456685 6053 target.go:111] Terraform output is in /tmp/test3588672596/out I0407 01:58:10.459672 6053 featureflag.go:164] FeatureFlag "Scaleway"=false --- PASS: TestMinimalScaleway (2.15s) === RUN TestHA I0407 01:58:10.459813 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:10.459937 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:10.459986 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:10.460047 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:10.460092 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:10.460153 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:10.460203 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:10.460238 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:10.460281 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:10.460312 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:10.494205 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:10.497829 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:10.497921 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:10.497981 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:10.498037 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.834764 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:11.953475 6053 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0407 01:58:11.954042 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:11.954067 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:11.954144 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:11.955876 6053 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0407 01:58:11.960159 6053 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0407 01:58:11.960453 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.960565 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.960680 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.960820 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.960879 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.961013 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.961109 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.961387 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:11.961502 6053 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0407 01:58:11.961771 6053 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0407 01:58:11.962666 6053 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0407 01:58:11.969228 6053 target.go:111] Terraform output is in /tmp/test3639494253/out --- PASS: TestHA (1.51s) === RUN TestHighAvailabilityGCE I0407 01:58:11.972430 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:11.973671 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:58:13.668588 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:58:13.668669 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:58:13.668766 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/main" W0407 01:58:13.668792 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com/backups/etcd/events" W0407 01:58:13.668812 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/ha-gce.example.com" W0407 01:58:13.668865 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0407 01:58:13.668927 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups W0407 01:58:13.668977 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:58:13.670156 6053 executor.go:111] Tasks: 0 done / 82 total; 49 can run I0407 01:58:13.676410 6053 executor.go:111] Tasks: 49 done / 82 total; 19 can run I0407 01:58:13.681381 6053 executor.go:111] Tasks: 68 done / 82 total; 8 can run I0407 01:58:13.682123 6053 executor.go:111] Tasks: 76 done / 82 total; 6 can run I0407 01:58:13.682330 6053 executor.go:111] Tasks: 82 done / 82 total; 0 can run I0407 01:58:13.684792 6053 target.go:111] Terraform output is in /tmp/test3360839686/out --- PASS: TestHighAvailabilityGCE (1.71s) === RUN TestComplex I0407 01:58:13.687342 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:13.687418 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:13.687448 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:13.687504 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:13.687529 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:13.687561 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:13.687585 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:13.687601 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:13.687624 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:13.687640 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:13.705861 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:58:13.709695 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:13.709820 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.573988 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:15.758269 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0407 01:58:15.759140 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:15.759184 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:15.759265 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:15.760390 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 01:58:15.762889 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 01:58:15.763490 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 01:58:15.763810 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 01:58:15.763876 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:15.763985 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:15.764109 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:15.764158 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:15.769216 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 01:58:15.769512 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.769739 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.770045 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.770391 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.770505 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 01:58:15.770781 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 01:58:15.771071 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 01:58:15.777234 6053 target.go:111] Terraform output is in /tmp/test1594083579/out I0407 01:58:15.781777 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:15.781886 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:15.781928 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:15.781980 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:15.782022 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:15.782071 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:15.782117 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:15.782147 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:15.782191 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:15.782219 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:15.817674 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:58:15.821236 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:15.821323 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.129984 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:17.316376 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0407 01:58:17.318491 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:17.318538 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:17.318641 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:17.320241 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 01:58:17.323503 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 01:58:17.324085 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 01:58:17.324251 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 01:58:17.324309 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:17.324363 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:17.324456 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:17.324500 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:17.327576 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 01:58:17.327678 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.327879 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.327963 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.328329 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.328389 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 01:58:17.328565 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 01:58:17.328810 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 01:58:17.335151 6053 target.go:111] Terraform output is in /tmp/test2964030934/out --- PASS: TestComplex (3.65s) === RUN TestCompress I0407 01:58:17.339772 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:17.339899 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:17.339946 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:17.339995 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:17.340037 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:17.340093 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:17.340135 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:17.340163 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:17.340202 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:17.340229 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:17.363471 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:17.366755 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:17.366847 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.657781 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:18.833746 6053 executor.go:111] Tasks: 0 done / 100 total; 44 can run I0407 01:58:18.834875 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:18.834918 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:18.835024 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:18.836488 6053 executor.go:111] Tasks: 44 done / 100 total; 23 can run I0407 01:58:18.842662 6053 executor.go:111] Tasks: 67 done / 100 total; 25 can run I0407 01:58:18.843266 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.843500 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.844663 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.844925 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.845039 6053 executor.go:111] Tasks: 92 done / 100 total; 2 can run I0407 01:58:18.845339 6053 executor.go:111] Tasks: 94 done / 100 total; 6 can run I0407 01:58:18.845699 6053 executor.go:111] Tasks: 100 done / 100 total; 0 can run I0407 01:58:18.855988 6053 target.go:111] Terraform output is in /tmp/test2765101409/out --- PASS: TestCompress (1.52s) === RUN TestExternalPolicies I0407 01:58:18.861191 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:18.861321 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:18.861365 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:18.861416 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:18.861461 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:18.861515 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:18.861558 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:18.861588 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:18.861631 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:18.861657 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:18.888927 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:18.892464 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:18.892545 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.197639 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:20.367207 6053 executor.go:111] Tasks: 0 done / 115 total; 47 can run I0407 01:58:20.367507 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:20.367537 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:20.368938 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:20.375996 6053 executor.go:111] Tasks: 47 done / 115 total; 22 can run I0407 01:58:20.379258 6053 executor.go:111] Tasks: 69 done / 115 total; 30 can run I0407 01:58:20.380063 6053 executor.go:111] Tasks: 99 done / 115 total; 4 can run W0407 01:58:20.380141 6053 api.go:53] PageSize not implemented W0407 01:58:20.380324 6053 api.go:53] PageSize not implemented I0407 01:58:20.385843 6053 executor.go:111] Tasks: 103 done / 115 total; 4 can run I0407 01:58:20.386102 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.386372 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.386841 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.386938 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.387069 6053 executor.go:111] Tasks: 107 done / 115 total; 2 can run I0407 01:58:20.387445 6053 executor.go:111] Tasks: 109 done / 115 total; 6 can run I0407 01:58:20.387736 6053 executor.go:111] Tasks: 115 done / 115 total; 0 can run I0407 01:58:20.393630 6053 target.go:111] Terraform output is in /tmp/test1166903506/out --- PASS: TestExternalPolicies (1.54s) === RUN TestMinimalIPv6 I0407 01:58:20.398270 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:20.398415 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:20.398462 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:20.398510 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:20.398555 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:20.398611 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:20.398653 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:20.398681 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:20.398720 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:20.398747 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:20.427792 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:20.431400 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:20.431483 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.741719 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:21.921568 6053 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0407 01:58:21.927634 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:21.927824 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:21.928147 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:21.930945 6053 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0407 01:58:21.934456 6053 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0407 01:58:21.935230 6053 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0407 01:58:21.935770 6053 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0407 01:58:21.935850 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:21.935936 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:21.935987 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:21.936077 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:21.941422 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 01:58:21.941615 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.941764 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.942303 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.942404 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.942501 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 01:58:21.942802 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 01:58:21.943063 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 01:58:21.949578 6053 target.go:111] Terraform output is in /tmp/test2456415682/out --- PASS: TestMinimalIPv6 (1.56s) === RUN TestMinimalIPv6Calico I0407 01:58:21.954413 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:21.954537 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:21.954585 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:21.954632 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:21.954670 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:21.954721 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:21.954808 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:21.954838 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:21.954876 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:21.954905 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:21.983899 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:21.987284 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:21.987363 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.314481 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:23.728489 6053 executor.go:111] Tasks: 0 done / 138 total; 47 can run I0407 01:58:23.730429 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:23.730462 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:23.730518 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:23.731851 6053 executor.go:111] Tasks: 47 done / 138 total; 25 can run I0407 01:58:23.734378 6053 executor.go:111] Tasks: 72 done / 138 total; 37 can run I0407 01:58:23.735215 6053 executor.go:111] Tasks: 109 done / 138 total; 9 can run I0407 01:58:23.735550 6053 executor.go:111] Tasks: 118 done / 138 total; 8 can run I0407 01:58:23.735637 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:23.735742 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:23.735794 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:23.735849 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:23.740984 6053 executor.go:111] Tasks: 126 done / 138 total; 4 can run I0407 01:58:23.741161 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.741330 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.741750 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.741916 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.742063 6053 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0407 01:58:23.742453 6053 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0407 01:58:23.742768 6053 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0407 01:58:23.754637 6053 target.go:111] Terraform output is in /tmp/test257954998/out --- PASS: TestMinimalIPv6Calico (1.81s) === RUN TestMinimalIPv6Cilium I0407 01:58:23.760616 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:23.760746 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:23.760806 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:23.760860 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:23.760906 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:23.760961 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:23.761048 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:23.761079 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:23.761119 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:23.761147 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:23.789611 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:23.793237 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:23.793317 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.097252 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:25.304262 6053 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0407 01:58:25.305280 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:25.305317 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:25.305419 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:25.307267 6053 executor.go:111] Tasks: 47 done / 137 total; 25 can run I0407 01:58:25.310617 6053 executor.go:111] Tasks: 72 done / 137 total; 36 can run I0407 01:58:25.311508 6053 executor.go:111] Tasks: 108 done / 137 total; 9 can run I0407 01:58:25.311953 6053 executor.go:111] Tasks: 117 done / 137 total; 8 can run I0407 01:58:25.312045 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:25.312164 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:25.312312 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:25.312413 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:25.317770 6053 executor.go:111] Tasks: 125 done / 137 total; 4 can run I0407 01:58:25.317958 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.318176 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.318470 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.318931 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.319046 6053 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0407 01:58:25.319351 6053 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0407 01:58:25.319666 6053 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0407 01:58:25.326277 6053 target.go:111] Terraform output is in /tmp/test87536678/out --- PASS: TestMinimalIPv6Cilium (1.57s) === RUN TestMinimalIPv6NoSubnetPrefix I0407 01:58:25.331279 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:25.331406 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:25.331451 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:25.331500 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:25.331540 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:25.331594 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:25.331633 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:25.331662 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:25.331699 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:25.331744 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:25.360483 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:25.364324 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:25.364410 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.696919 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:26.872561 6053 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0407 01:58:26.873304 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:26.873344 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:26.873442 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:26.876360 6053 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0407 01:58:26.879693 6053 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0407 01:58:26.880639 6053 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0407 01:58:26.881098 6053 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0407 01:58:26.881248 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:26.881364 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:26.881496 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:58:26.881573 6053 loadbalancers.go:35] PageSize not implemented I0407 01:58:26.886909 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 01:58:26.887123 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.887251 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.887579 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.887990 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.888114 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 01:58:26.888445 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 01:58:26.888829 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 01:58:26.895210 6053 target.go:111] Terraform output is in /tmp/test799499099/out --- PASS: TestMinimalIPv6NoSubnetPrefix (1.57s) === RUN TestMinimalWarmPool I0407 01:58:26.899940 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:26.900070 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:26.900111 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:26.900161 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:26.900208 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:26.900265 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:26.900307 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:26.900335 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:26.900374 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:26.900401 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:26.930062 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:26.934011 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:26.934126 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.208756 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:28.412045 6053 executor.go:111] Tasks: 0 done / 102 total; 46 can run I0407 01:58:28.412613 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:28.412641 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:28.412702 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:28.419650 6053 executor.go:111] Tasks: 46 done / 102 total; 23 can run I0407 01:58:28.426195 6053 executor.go:111] Tasks: 69 done / 102 total; 25 can run I0407 01:58:28.426673 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.426862 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.427337 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.427425 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.427511 6053 executor.go:111] Tasks: 94 done / 102 total; 2 can run I0407 01:58:28.427825 6053 executor.go:111] Tasks: 96 done / 102 total; 6 can run I0407 01:58:28.428175 6053 executor.go:111] Tasks: 102 done / 102 total; 0 can run I0407 01:58:28.433563 6053 target.go:111] Terraform output is in /tmp/test1377717376/out --- PASS: TestMinimalWarmPool (1.54s) === RUN TestMinimalEtcd I0407 01:58:28.438293 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:28.438445 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:28.438490 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:28.438539 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:28.438585 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:28.438637 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:28.438678 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:28.438707 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:28.438746 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:28.438773 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:28.464030 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:28.467465 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:28.467550 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:29.775133 6053 zones.go:93] ListHostedZonesPages { } W0407 01:58:29.938006 6053 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc W0407 01:58:29.938074 6053 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 10 W0407 01:58:29.940784 6053 model.go:332] overloading image in manifest (embedded etcd manifest) with images gcr.io/k8s-staging-etcdadm/etcd:v20210430-v0.1.3-739-g7da12acc I0407 01:58:29.953869 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:58:29.955802 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:29.955846 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:29.955921 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:29.957064 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:58:29.968984 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:58:29.969529 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:29.969849 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:29.970163 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:29.970777 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:29.970892 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:58:29.971188 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:58:29.971516 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:58:29.976595 6053 target.go:111] Terraform output is in /tmp/test1089694783/out --- PASS: TestMinimalEtcd (1.54s) === RUN TestMinimalGp3 I0407 01:58:29.981109 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:29.981236 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:29.981282 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:29.981330 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:29.981377 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:29.981430 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:29.981473 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:29.981502 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:29.981540 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:29.981569 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:30.006037 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:30.009274 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:30.009362 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.308741 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:31.481014 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:58:31.481531 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:31.481579 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:31.481686 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:31.483857 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:58:31.490612 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:58:31.491041 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.491274 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.491555 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.492053 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.492181 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:58:31.492490 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:58:31.492837 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:58:31.497878 6053 target.go:111] Terraform output is in /tmp/test2456535816/out --- PASS: TestMinimalGp3 (1.52s) === RUN TestMinimalLongClusterName I0407 01:58:31.502441 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:31.502565 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:31.502607 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:31.502654 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:31.502694 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:31.502747 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:31.502787 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:31.502818 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:31.502856 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:31.502890 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:31.526336 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:31.529549 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:31.529636 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:58:32.819105 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:32.990698 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:58:32.991700 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:32.991768 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:32.991909 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:32.994306 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:58:33.000258 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:58:33.000455 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.000949 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.001278 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.001768 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.001890 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:58:33.002267 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:58:33.002564 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:58:33.007954 6053 target.go:111] Terraform output is in /tmp/test923305475/out --- PASS: TestMinimalLongClusterName (1.51s) === RUN TestExistingSG I0407 01:58:33.012592 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:33.012718 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:33.012761 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:33.012813 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:33.012859 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:33.012913 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:33.012955 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:33.012987 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:33.013025 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:33.013052 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:33.049298 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:33.053499 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.053593 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.053653 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:33.053706 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.375592 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:34.561680 6053 executor.go:111] Tasks: 0 done / 163 total; 53 can run I0407 01:58:34.563276 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:34.563315 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:34.563411 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:34.566472 6053 executor.go:111] Tasks: 53 done / 163 total; 26 can run I0407 01:58:34.572523 6053 executor.go:111] Tasks: 79 done / 163 total; 54 can run I0407 01:58:34.574615 6053 executor.go:111] Tasks: 133 done / 163 total; 6 can run W0407 01:58:34.574808 6053 api.go:53] PageSize not implemented W0407 01:58:34.574872 6053 api.go:53] PageSize not implemented W0407 01:58:34.574919 6053 api.go:53] PageSize not implemented W0407 01:58:34.575105 6053 api.go:53] PageSize not implemented I0407 01:58:34.581129 6053 executor.go:111] Tasks: 139 done / 163 total; 8 can run I0407 01:58:34.581311 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.581550 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.581846 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582042 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582127 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582313 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582403 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582588 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.582716 6053 executor.go:111] Tasks: 147 done / 163 total; 4 can run I0407 01:58:34.583063 6053 executor.go:111] Tasks: 151 done / 163 total; 12 can run I0407 01:58:34.583503 6053 executor.go:111] Tasks: 163 done / 163 total; 0 can run I0407 01:58:34.591538 6053 target.go:111] Terraform output is in /tmp/test2680006901/out --- PASS: TestExistingSG (1.58s) === RUN TestBastionAdditionalUserData I0407 01:58:34.597323 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:34.597461 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:34.597506 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:34.597555 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:34.597601 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:34.597655 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:34.597727 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:34.597762 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:34.597802 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:34.597832 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:34.625615 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:34.628628 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.628705 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:34.628755 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:35.963002 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:36.140813 6053 executor.go:111] Tasks: 0 done / 137 total; 47 can run I0407 01:58:36.141997 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:36.142054 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:36.142209 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:36.144486 6053 executor.go:111] Tasks: 47 done / 137 total; 30 can run I0407 01:58:36.147700 6053 executor.go:111] Tasks: 77 done / 137 total; 35 can run I0407 01:58:36.148567 6053 executor.go:111] Tasks: 112 done / 137 total; 6 can run W0407 01:58:36.148631 6053 api.go:53] PageSize not implemented W0407 01:58:36.148779 6053 api.go:53] PageSize not implemented W0407 01:58:36.148886 6053 api.go:53] PageSize not implemented I0407 01:58:36.154442 6053 executor.go:111] Tasks: 118 done / 137 total; 7 can run I0407 01:58:36.154641 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.154777 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.155030 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.155228 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.155647 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.155783 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.155906 6053 executor.go:111] Tasks: 125 done / 137 total; 3 can run I0407 01:58:36.156273 6053 executor.go:111] Tasks: 128 done / 137 total; 9 can run I0407 01:58:36.156634 6053 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0407 01:58:36.168045 6053 target.go:111] Terraform output is in /tmp/test2132066973/out --- PASS: TestBastionAdditionalUserData (1.58s) === RUN TestPrivateFlannel I0407 01:58:36.173209 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:36.173339 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:36.173384 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:36.173433 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:36.173475 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:36.173530 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:36.173616 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:36.173646 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:36.173687 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:36.173718 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:36.201085 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:36.204506 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.204595 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:36.204652 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.493446 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:37.659334 6053 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0407 01:58:37.659963 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:37.660016 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:37.660123 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:37.663670 6053 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0407 01:58:37.669233 6053 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0407 01:58:37.669774 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.670045 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.670169 6053 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0407 01:58:37.670327 6053 api.go:53] PageSize not implemented W0407 01:58:37.670504 6053 api.go:53] PageSize not implemented I0407 01:58:37.676339 6053 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0407 01:58:37.676600 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.676809 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.677284 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.677369 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.677456 6053 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0407 01:58:37.677785 6053 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0407 01:58:37.678170 6053 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0407 01:58:37.684967 6053 target.go:111] Terraform output is in /tmp/test3720086781/out --- PASS: TestPrivateFlannel (1.52s) === RUN TestPrivateCalico I0407 01:58:37.690067 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:37.690194 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:37.690237 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:37.690285 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:37.690324 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:37.690385 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:37.690471 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:37.690501 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:37.690539 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:37.690567 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:37.718836 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:37.722492 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.722573 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:37.722631 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.024961 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:39.464708 6053 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0407 01:58:39.466819 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:39.466876 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:39.467020 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:39.468190 6053 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0407 01:58:39.471501 6053 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0407 01:58:39.472206 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.472368 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.472484 6053 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0407 01:58:39.472533 6053 api.go:53] PageSize not implemented W0407 01:58:39.472686 6053 api.go:53] PageSize not implemented I0407 01:58:39.478014 6053 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0407 01:58:39.478238 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.478439 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.478819 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.479167 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.479276 6053 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0407 01:58:39.479583 6053 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0407 01:58:39.479911 6053 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0407 01:58:39.487152 6053 target.go:111] Terraform output is in /tmp/test2937992865/out --- PASS: TestPrivateCalico (1.81s) === RUN TestPrivateCilium I0407 01:58:39.497673 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:39.497818 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:39.497868 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:39.497921 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:39.497968 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:39.498024 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:39.498069 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:39.498100 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:39.498138 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:39.498168 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:39.527132 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:39.530918 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.531005 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:39.531061 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:40.847382 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:41.060649 6053 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0407 01:58:41.061118 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:41.061157 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:41.061238 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:41.063383 6053 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0407 01:58:41.066469 6053 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0407 01:58:41.067170 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.067324 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.067446 6053 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0407 01:58:41.067496 6053 api.go:53] PageSize not implemented W0407 01:58:41.067658 6053 api.go:53] PageSize not implemented I0407 01:58:41.073078 6053 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0407 01:58:41.073248 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.073398 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.073683 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.074064 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.074171 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 01:58:41.074457 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 01:58:41.074793 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 01:58:41.081546 6053 target.go:111] Terraform output is in /tmp/test2232582242/out --- PASS: TestPrivateCilium (1.59s) === RUN TestPrivateCilium2 I0407 01:58:41.086515 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:41.086641 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:41.086685 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:41.086732 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:41.086771 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:41.086826 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:41.086910 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:41.086942 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:41.086980 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:41.087010 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:41.119940 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:58:41.124267 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.124364 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:41.124424 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:42.436208 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:43.104589 6053 executor.go:111] Tasks: 0 done / 138 total; 50 can run I0407 01:58:43.104976 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:43.105030 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:43.105194 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:43.108156 6053 executor.go:111] Tasks: 50 done / 138 total; 30 can run I0407 01:58:43.111582 6053 executor.go:111] Tasks: 80 done / 138 total; 36 can run I0407 01:58:43.112199 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.112366 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.112467 6053 executor.go:111] Tasks: 116 done / 138 total; 6 can run W0407 01:58:43.112551 6053 api.go:53] PageSize not implemented W0407 01:58:43.112701 6053 api.go:53] PageSize not implemented I0407 01:58:43.121756 6053 executor.go:111] Tasks: 122 done / 138 total; 8 can run I0407 01:58:43.122119 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.122359 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.122840 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.122942 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.123102 6053 executor.go:111] Tasks: 130 done / 138 total; 2 can run I0407 01:58:43.123710 6053 executor.go:111] Tasks: 132 done / 138 total; 6 can run I0407 01:58:43.124136 6053 executor.go:111] Tasks: 138 done / 138 total; 0 can run I0407 01:58:43.131838 6053 target.go:111] Terraform output is in /tmp/test4162404868/out --- PASS: TestPrivateCilium2 (2.05s) === RUN TestPrivateCiliumAdvanced I0407 01:58:43.140332 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:43.140467 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:43.140514 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:43.140565 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:43.140606 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:43.140662 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:43.140706 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:43.140737 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:43.140776 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:43.140804 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:43.172272 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:43.175748 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.175815 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:43.175857 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.484485 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:44.703721 6053 executor.go:111] Tasks: 0 done / 142 total; 54 can run I0407 01:58:44.705238 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:44.705281 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:44.705414 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:44.706748 6053 executor.go:111] Tasks: 54 done / 142 total; 30 can run I0407 01:58:44.714527 6053 executor.go:111] Tasks: 84 done / 142 total; 36 can run I0407 01:58:44.714888 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.715114 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.715506 6053 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0407 01:58:44.715572 6053 api.go:53] PageSize not implemented W0407 01:58:44.715761 6053 api.go:53] PageSize not implemented I0407 01:58:44.722055 6053 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0407 01:58:44.722234 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.722408 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.722904 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.722999 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.723090 6053 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0407 01:58:44.723397 6053 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0407 01:58:44.723720 6053 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0407 01:58:44.731393 6053 target.go:111] Terraform output is in /tmp/test3631486053/out --- PASS: TestPrivateCiliumAdvanced (1.60s) === RUN TestPrivateCiliumENI I0407 01:58:44.736780 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:44.736911 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:44.736956 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:44.737003 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:44.737044 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:44.737104 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:44.737150 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:44.737179 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:44.737218 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:44.737248 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:44.763949 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:44.767297 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.767377 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:44.767430 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.056892 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:46.270850 6053 executor.go:111] Tasks: 0 done / 136 total; 48 can run I0407 01:58:46.272622 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:46.272678 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:46.272783 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:46.279047 6053 executor.go:111] Tasks: 48 done / 136 total; 30 can run I0407 01:58:46.282529 6053 executor.go:111] Tasks: 78 done / 136 total; 36 can run I0407 01:58:46.282961 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.283118 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.283332 6053 executor.go:111] Tasks: 114 done / 136 total; 6 can run W0407 01:58:46.283480 6053 api.go:53] PageSize not implemented W0407 01:58:46.283682 6053 api.go:53] PageSize not implemented I0407 01:58:46.289170 6053 executor.go:111] Tasks: 120 done / 136 total; 8 can run I0407 01:58:46.289350 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.289564 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.289828 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.290286 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.290397 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 01:58:46.290686 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 01:58:46.290968 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 01:58:46.297690 6053 target.go:111] Terraform output is in /tmp/test2948553232/out --- PASS: TestPrivateCiliumENI (1.57s) === RUN TestPrivateCanal I0407 01:58:46.303139 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:46.303268 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:46.303311 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:46.303363 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:46.303409 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:46.303465 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:46.303550 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:46.303581 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:46.303624 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:46.303653 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:46.330623 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:58:46.333790 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.333868 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:46.333920 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:47.644626 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:48.089670 6053 executor.go:111] Tasks: 0 done / 137 total; 49 can run I0407 01:58:48.090571 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:48.090605 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:48.090695 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:48.092357 6053 executor.go:111] Tasks: 49 done / 137 total; 30 can run I0407 01:58:48.095676 6053 executor.go:111] Tasks: 79 done / 137 total; 36 can run I0407 01:58:48.096216 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.096405 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.096564 6053 executor.go:111] Tasks: 115 done / 137 total; 6 can run W0407 01:58:48.096696 6053 api.go:53] PageSize not implemented W0407 01:58:48.096786 6053 api.go:53] PageSize not implemented I0407 01:58:48.106777 6053 executor.go:111] Tasks: 121 done / 137 total; 8 can run I0407 01:58:48.107026 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.107249 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.107491 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.108056 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.108179 6053 executor.go:111] Tasks: 129 done / 137 total; 2 can run I0407 01:58:48.108518 6053 executor.go:111] Tasks: 131 done / 137 total; 6 can run I0407 01:58:48.108908 6053 executor.go:111] Tasks: 137 done / 137 total; 0 can run I0407 01:58:48.117115 6053 target.go:111] Terraform output is in /tmp/test875918807/out --- PASS: TestPrivateCanal (1.82s) === RUN TestPrivateKopeio I0407 01:58:48.122818 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:48.122946 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:48.122991 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:48.123041 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:48.123084 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:48.123138 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:48.123182 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:48.123211 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:48.123248 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:48.123284 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:48.151717 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:48.155006 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.155119 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:48.155181 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.456340 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:49.632073 6053 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0407 01:58:49.632697 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:49.632748 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:49.632847 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:49.639319 6053 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0407 01:58:49.642704 6053 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0407 01:58:49.643164 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.643350 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.643593 6053 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0407 01:58:49.643648 6053 api.go:53] PageSize not implemented W0407 01:58:49.643781 6053 api.go:53] PageSize not implemented I0407 01:58:49.648373 6053 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0407 01:58:49.648535 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.648693 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.648907 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.649342 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.649465 6053 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0407 01:58:49.649870 6053 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0407 01:58:49.650219 6053 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0407 01:58:49.657119 6053 target.go:111] Terraform output is in /tmp/test1496058070/out --- PASS: TestPrivateKopeio (1.54s) === RUN TestUnmanaged I0407 01:58:49.662120 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:49.662250 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:49.662294 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:49.662341 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:49.662379 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:49.662435 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:49.662480 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:49.662510 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:49.662547 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:49.662574 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:49.691958 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:49.695215 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.695293 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:49.695346 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.004509 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:51.182595 6053 executor.go:111] Tasks: 0 done / 126 total; 46 can run I0407 01:58:51.183299 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:51.183356 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:51.183499 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:51.190072 6053 executor.go:111] Tasks: 46 done / 126 total; 27 can run I0407 01:58:51.193533 6053 executor.go:111] Tasks: 73 done / 126 total; 33 can run I0407 01:58:51.194242 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.194419 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.194552 6053 executor.go:111] Tasks: 106 done / 126 total; 5 can run W0407 01:58:51.194607 6053 api.go:53] PageSize not implemented W0407 01:58:51.194697 6053 api.go:53] PageSize not implemented I0407 01:58:51.200444 6053 executor.go:111] Tasks: 111 done / 126 total; 7 can run I0407 01:58:51.200760 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.201040 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.201227 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.201748 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.201853 6053 executor.go:111] Tasks: 118 done / 126 total; 2 can run I0407 01:58:51.202136 6053 executor.go:111] Tasks: 120 done / 126 total; 6 can run I0407 01:58:51.202398 6053 executor.go:111] Tasks: 126 done / 126 total; 0 can run I0407 01:58:51.208834 6053 target.go:111] Terraform output is in /tmp/test916630866/out --- PASS: TestUnmanaged (1.55s) === RUN TestPrivateSharedSubnet I0407 01:58:51.213617 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:51.213742 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:51.213785 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:51.213831 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:51.213874 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:51.213923 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:51.213965 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:51.213995 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:51.214035 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:51.214063 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:51.241804 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:51.244970 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.245046 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:51.245140 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.552662 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:52.731925 6053 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0407 01:58:52.732773 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:52.732839 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:52.732977 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:52.734647 6053 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0407 01:58:52.735234 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:58:52.737851 6053 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0407 01:58:52.740281 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.740472 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.741944 6053 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0407 01:58:52.742289 6053 api.go:53] PageSize not implemented W0407 01:58:52.742718 6053 api.go:53] PageSize not implemented I0407 01:58:52.749932 6053 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0407 01:58:52.750226 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.750467 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.750715 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.751275 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.751395 6053 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0407 01:58:52.751748 6053 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0407 01:58:52.752064 6053 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0407 01:58:52.758592 6053 target.go:111] Terraform output is in /tmp/test3788304629/out --- PASS: TestPrivateSharedSubnet (1.55s) === RUN TestPrivateSharedIP I0407 01:58:52.763543 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:52.763666 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:52.763709 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:52.763756 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:52.763795 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:52.763850 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:52.763890 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:52.763919 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:52.763956 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:52.763981 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:52.791074 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:52.794569 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.794653 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:52.794710 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.083783 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:54.261186 6053 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0407 01:58:54.264581 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:54.264629 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:54.264717 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:54.266199 6053 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0407 01:58:54.266449 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:58:54.269536 6053 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0407 01:58:54.270171 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.270348 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.270460 6053 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0407 01:58:54.270507 6053 api.go:53] PageSize not implemented W0407 01:58:54.270725 6053 api.go:53] PageSize not implemented I0407 01:58:54.275930 6053 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0407 01:58:54.276089 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.276341 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.276513 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.277072 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.277196 6053 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0407 01:58:54.277488 6053 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0407 01:58:54.277817 6053 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0407 01:58:54.284397 6053 target.go:111] Terraform output is in /tmp/test2028315728/out --- PASS: TestPrivateSharedIP (1.53s) === RUN TestPrivateDns1 I0407 01:58:54.290815 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:54.291033 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:54.291126 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:54.291208 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:54.291311 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:54.291416 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:54.291510 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:54.291578 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:54.291666 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:54.291719 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:58:54.325452 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.325542 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:54.325598 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.892464 6053 executor.go:111] Tasks: 0 done / 135 total; 46 can run I0407 01:58:55.896163 6053 executor.go:111] Tasks: 46 done / 135 total; 28 can run I0407 01:58:55.896641 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "internal.example.com" I0407 01:58:55.896697 6053 zones.go:40] GetHostedZone { Id: "/hostedzone/Z2AFAKE1ZON3NO" } I0407 01:58:55.896807 6053 dnszone.go:248] Existing zone "internal.example.com." found; will configure TF to reuse I0407 01:58:55.896826 6053 dnszone.go:271] No association between VPC "privatedns1.example.com" and zone "internal.example.com."; adding I0407 01:58:55.896911 6053 executor.go:111] Tasks: 74 done / 135 total; 39 can run I0407 01:58:55.897351 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.897595 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.900019 6053 executor.go:111] Tasks: 113 done / 135 total; 6 can run W0407 01:58:55.900140 6053 api.go:53] PageSize not implemented W0407 01:58:55.900197 6053 api.go:53] PageSize not implemented I0407 01:58:55.905746 6053 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0407 01:58:55.905933 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.906095 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.906540 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.906636 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.906743 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 01:58:55.907037 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 01:58:55.907377 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 01:58:55.914191 6053 target.go:111] Terraform output is in /tmp/test1578396625/out --- PASS: TestPrivateDns1 (1.63s) === RUN TestPrivateDns2 I0407 01:58:55.919101 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:55.919226 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:55.919269 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:55.919316 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:55.919357 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:55.919412 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:55.919461 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:55.919490 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:55.919529 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:55.919557 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:55.950013 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.950086 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:55.950140 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.445442 6053 executor.go:111] Tasks: 0 done / 132 total; 45 can run I0407 01:58:57.449580 6053 executor.go:111] Tasks: 45 done / 132 total; 26 can run I0407 01:58:57.449816 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "private.example.com" I0407 01:58:57.449871 6053 zones.go:40] GetHostedZone { Id: "/hostedzone/Z3AFAKE1ZOMORE" } I0407 01:58:57.450001 6053 dnszone.go:248] Existing zone "private.example.com." found; will configure TF to reuse I0407 01:58:57.449929 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:58:57.450031 6053 dnszone.go:262] VPC "vpc-12345678" already associated with zone "private.example.com." I0407 01:58:57.450871 6053 executor.go:111] Tasks: 71 done / 132 total; 39 can run I0407 01:58:57.452022 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.452215 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.453960 6053 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0407 01:58:57.454079 6053 api.go:53] PageSize not implemented W0407 01:58:57.454166 6053 api.go:53] PageSize not implemented I0407 01:58:57.463081 6053 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0407 01:58:57.463325 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.463512 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.464013 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.464104 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.464196 6053 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0407 01:58:57.464509 6053 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0407 01:58:57.464914 6053 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0407 01:58:57.472403 6053 target.go:111] Terraform output is in /tmp/test686284304/out --- PASS: TestPrivateDns2 (1.56s) === RUN TestDiscoveryFeatureGate I0407 01:58:57.478066 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:57.478194 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:57.478238 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:57.478326 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:57.478418 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:57.478478 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:57.478520 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:57.478551 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:57.478596 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:57.478625 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:57.503468 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:58:57.506876 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:57.506960 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:58.812568 6053 zones.go:93] ListHostedZonesPages { } I0407 01:58:59.026313 6053 executor.go:111] Tasks: 0 done / 113 total; 52 can run I0407 01:58:59.026810 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:58:59.026856 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:58:59.026970 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:58:59.031315 6053 executor.go:111] Tasks: 52 done / 113 total; 28 can run I0407 01:58:59.040390 6053 executor.go:111] Tasks: 80 done / 113 total; 25 can run I0407 01:58:59.040984 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:59.041214 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:59.041740 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:59.041887 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:59.042047 6053 executor.go:111] Tasks: 105 done / 113 total; 2 can run I0407 01:58:59.042527 6053 executor.go:111] Tasks: 107 done / 113 total; 6 can run I0407 01:58:59.042929 6053 executor.go:111] Tasks: 113 done / 113 total; 0 can run I0407 01:58:59.048893 6053 target.go:111] Terraform output is in /tmp/test801143019/out --- PASS: TestDiscoveryFeatureGate (1.58s) === RUN TestVFSServiceAccountIssuerDiscovery I0407 01:58:59.055155 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:59.055280 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:59.055322 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:59.055378 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:59.055420 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:59.055474 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:59.055515 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:59.055546 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:59.055586 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:59.055615 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:59.079819 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:58:59.082731 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:58:59.082806 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.398319 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:00.581749 6053 executor.go:111] Tasks: 0 done / 104 total; 47 can run I0407 01:59:00.582366 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:00.582406 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:00.582527 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:00.585999 6053 executor.go:111] Tasks: 47 done / 104 total; 24 can run I0407 01:59:00.591773 6053 executor.go:111] Tasks: 71 done / 104 total; 25 can run I0407 01:59:00.592149 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.592365 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.592741 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.593094 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.593210 6053 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0407 01:59:00.593526 6053 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0407 01:59:00.593870 6053 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0407 01:59:00.599059 6053 target.go:111] Terraform output is in /tmp/test3786259029/out --- PASS: TestVFSServiceAccountIssuerDiscovery (1.55s) === RUN TestAWSLBController I0407 01:59:00.603857 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:00.603983 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:00.604027 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:00.604078 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:00.604122 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:00.604177 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:00.604223 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:00.604251 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:00.604287 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:00.604314 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:00.636109 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:00.639395 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:00.639487 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:01.930196 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:02.665776 6053 executor.go:111] Tasks: 0 done / 116 total; 54 can run I0407 01:59:02.668000 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:02.668026 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:02.669296 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:02.676219 6053 executor.go:111] Tasks: 54 done / 116 total; 29 can run I0407 01:59:02.682144 6053 executor.go:111] Tasks: 83 done / 116 total; 25 can run I0407 01:59:02.682567 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:02.682804 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:02.683349 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:02.683457 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:02.683565 6053 executor.go:111] Tasks: 108 done / 116 total; 2 can run I0407 01:59:02.683886 6053 executor.go:111] Tasks: 110 done / 116 total; 6 can run I0407 01:59:02.684209 6053 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0407 01:59:02.690627 6053 target.go:111] Terraform output is in /tmp/test3840724752/out --- PASS: TestAWSLBController (2.10s) === RUN TestManyAddons I0407 01:59:02.703830 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:02.703977 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:02.704027 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:02.704079 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:02.704123 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:02.704176 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:02.704220 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:02.704249 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:02.704287 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:02.704319 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:02.732903 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:02.736441 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:02.736533 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.034036 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:04.866887 6053 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0407 01:59:04.867103 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:04.867128 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:04.867194 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:04.875688 6053 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0407 01:59:04.881583 6053 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0407 01:59:04.881974 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.882244 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.882450 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.882957 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.883078 6053 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0407 01:59:04.883444 6053 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0407 01:59:04.883824 6053 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0407 01:59:04.890124 6053 target.go:111] Terraform output is in /tmp/test2089182336/out --- PASS: TestManyAddons (2.20s) === RUN TestManyAddonsCCMIRSA I0407 01:59:04.903670 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:04.903815 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:04.903865 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:04.903917 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:04.903962 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:04.904014 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:04.904060 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:04.904089 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:04.904126 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:04.904155 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:04.933189 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:04.936838 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:04.936932 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:06.245611 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:07.117130 6053 executor.go:111] Tasks: 0 done / 123 total; 59 can run I0407 01:59:07.119397 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:07.119446 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:07.119581 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:07.122629 6053 executor.go:111] Tasks: 59 done / 123 total; 30 can run I0407 01:59:07.132904 6053 executor.go:111] Tasks: 89 done / 123 total; 26 can run I0407 01:59:07.133153 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:07.133671 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:07.133940 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:07.134204 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:07.134333 6053 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0407 01:59:07.134666 6053 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0407 01:59:07.135004 6053 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0407 01:59:07.140575 6053 target.go:111] Terraform output is in /tmp/test2606387844/out --- PASS: TestManyAddonsCCMIRSA (2.24s) === RUN TestManyAddonsCCMIRSA23 I0407 01:59:07.148470 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:07.148568 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:07.148605 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:07.148645 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:07.148677 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:07.148718 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:07.148754 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:07.148779 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:07.148810 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:07.148831 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:07.168266 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0407 01:59:07.170942 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:07.171005 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:08.475389 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:09.323996 6053 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0407 01:59:09.324447 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:09.324487 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:09.324596 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:09.328996 6053 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0407 01:59:09.340974 6053 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0407 01:59:09.341282 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:09.341698 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:09.342047 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:09.342194 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:09.342306 6053 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0407 01:59:09.342593 6053 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0407 01:59:09.342975 6053 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0407 01:59:09.350716 6053 target.go:111] Terraform output is in /tmp/test3347776480/out --- PASS: TestManyAddonsCCMIRSA23 (2.21s) === RUN TestManyAddonsCCMIRSA24 I0407 01:59:09.361892 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:09.362081 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:09.362137 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:09.362191 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:09.362246 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:09.362311 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:09.362358 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:09.362386 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:09.362437 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:09.362474 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:09.388948 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 01:59:09.392547 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:09.392625 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:10.717398 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:11.576598 6053 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0407 01:59:11.579351 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:11.579402 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:11.579500 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:11.582851 6053 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0407 01:59:11.588442 6053 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0407 01:59:11.588675 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:11.589114 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:11.589410 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:11.590769 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:11.590962 6053 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0407 01:59:11.591700 6053 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0407 01:59:11.592141 6053 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0407 01:59:11.601940 6053 target.go:111] Terraform output is in /tmp/test905884150/out --- PASS: TestManyAddonsCCMIRSA24 (2.25s) === RUN TestManyAddonsCCMIRSA25 I0407 01:59:11.612500 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:11.612664 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:11.612713 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:11.612767 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:11.612813 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:11.612867 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:11.612912 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:11.612943 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:11.612982 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:11.613014 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:11.640065 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:59:11.643396 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:11.643478 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:12.947333 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:13.792826 6053 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0407 01:59:13.798010 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:13.798041 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:13.798114 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:13.803311 6053 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0407 01:59:13.809400 6053 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0407 01:59:13.809696 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:13.809933 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:13.810172 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:13.810647 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:13.810763 6053 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0407 01:59:13.811119 6053 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0407 01:59:13.811505 6053 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0407 01:59:13.819371 6053 target.go:111] Terraform output is in /tmp/test1782030201/out --- PASS: TestManyAddonsCCMIRSA25 (2.22s) === RUN TestManyAddonsCCMIRSA26 I0407 01:59:13.829490 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:13.829622 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:13.829670 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:13.829727 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:13.829771 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:13.829825 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:13.829873 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:13.829901 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:13.829939 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:13.829968 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:13.864687 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:59:13.868479 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:13.868576 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:15.155204 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:16.017693 6053 executor.go:111] Tasks: 0 done / 124 total; 60 can run I0407 01:59:16.020844 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:16.020876 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:16.020975 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:16.023368 6053 executor.go:111] Tasks: 60 done / 124 total; 30 can run I0407 01:59:16.034239 6053 executor.go:111] Tasks: 90 done / 124 total; 26 can run I0407 01:59:16.034927 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:16.035713 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:16.035869 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:16.036310 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:16.036428 6053 executor.go:111] Tasks: 116 done / 124 total; 2 can run I0407 01:59:16.036759 6053 executor.go:111] Tasks: 118 done / 124 total; 6 can run I0407 01:59:16.037023 6053 executor.go:111] Tasks: 124 done / 124 total; 0 can run I0407 01:59:16.044681 6053 target.go:111] Terraform output is in /tmp/test4085750029/out --- PASS: TestManyAddonsCCMIRSA26 (2.23s) === RUN TestManyAddonsGCE I0407 01:59:16.056319 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:59:18.255012 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 01:59:18.255090 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 01:59:18.255168 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/main" W0407 01:59:18.255186 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com/backups/etcd/events" W0407 01:59:18.255200 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal.example.com" W0407 01:59:18.255243 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 01:59:18.256176 6053 executor.go:111] Tasks: 0 done / 67 total; 44 can run I0407 01:59:18.265648 6053 executor.go:111] Tasks: 44 done / 67 total; 17 can run I0407 01:59:18.271440 6053 executor.go:111] Tasks: 61 done / 67 total; 4 can run I0407 01:59:18.272455 6053 executor.go:111] Tasks: 65 done / 67 total; 2 can run I0407 01:59:18.272655 6053 executor.go:111] Tasks: 67 done / 67 total; 0 can run I0407 01:59:18.276560 6053 target.go:111] Terraform output is in /tmp/test3939290175/out --- PASS: TestManyAddonsGCE (2.23s) === RUN TestCCM I0407 01:59:18.287207 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:18.287339 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:18.287383 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:18.287431 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:18.287469 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:18.287519 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:18.287560 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:18.287585 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:18.287621 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:18.287648 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:18.314264 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:18.318014 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:18.318104 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:19.636632 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:20.456215 6053 executor.go:111] Tasks: 0 done / 110 total; 51 can run I0407 01:59:20.459387 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:20.459410 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:20.459812 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:20.466015 6053 executor.go:111] Tasks: 51 done / 110 total; 24 can run I0407 01:59:20.471829 6053 executor.go:111] Tasks: 75 done / 110 total; 27 can run I0407 01:59:20.472321 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:20.472587 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:20.472840 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:20.473432 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:20.473558 6053 executor.go:111] Tasks: 102 done / 110 total; 2 can run I0407 01:59:20.473885 6053 executor.go:111] Tasks: 104 done / 110 total; 6 can run I0407 01:59:20.474288 6053 executor.go:111] Tasks: 110 done / 110 total; 0 can run I0407 01:59:20.480682 6053 target.go:111] Terraform output is in /tmp/test2237066705/out --- PASS: TestCCM (2.21s) === RUN TestExternalDNS I0407 01:59:20.494580 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:20.494723 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:20.494766 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:20.494817 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:20.494861 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:20.494915 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:20.494959 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:20.494988 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:20.495025 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:20.495070 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:20.520819 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:20.524008 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:20.524092 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:21.842270 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:22.024996 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:22.026719 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:22.026762 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:22.026863 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:22.030515 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:22.037876 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:22.038709 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:22.039624 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:22.040783 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:22.040950 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:22.041059 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:22.041380 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:22.041648 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:22.047506 6053 target.go:111] Terraform output is in /tmp/test906970584/out --- PASS: TestExternalDNS (1.56s) === RUN TestExternalDNSIRSA I0407 01:59:22.052570 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:22.052703 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:22.052746 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:22.052791 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:22.052833 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:22.052888 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:22.052933 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:22.052965 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:22.053004 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:22.053033 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:22.077498 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:22.080715 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:22.080805 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.381272 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:23.600620 6053 executor.go:111] Tasks: 0 done / 112 total; 51 can run I0407 01:59:23.600915 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:23.600939 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:23.601015 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:23.605991 6053 executor.go:111] Tasks: 51 done / 112 total; 28 can run I0407 01:59:23.614232 6053 executor.go:111] Tasks: 79 done / 112 total; 25 can run I0407 01:59:23.614730 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.614927 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.615431 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.615590 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.615715 6053 executor.go:111] Tasks: 104 done / 112 total; 2 can run I0407 01:59:23.616053 6053 executor.go:111] Tasks: 106 done / 112 total; 6 can run I0407 01:59:23.616419 6053 executor.go:111] Tasks: 112 done / 112 total; 0 can run I0407 01:59:23.622673 6053 target.go:111] Terraform output is in /tmp/test488547878/out --- PASS: TestExternalDNSIRSA (1.58s) === RUN TestKarpenter I0407 01:59:23.628382 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:23.628527 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:23.628570 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:23.628619 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:23.628662 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:23.628715 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:23.628756 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:23.628786 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:23.628829 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:23.628857 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:23.659275 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:59:23.662431 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.662499 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:23.662546 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:24.998347 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:25.198857 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.198994 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.199108 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } W0407 01:59:25.342272 6053 pruning.go:115] manifest includes an object of GroupKind Secret, which will not be pruned W0407 01:59:25.342352 6053 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0407 01:59:25.342370 6053 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned W0407 01:59:25.342384 6053 pruning.go:115] manifest includes an object of GroupKind AWSNodeTemplate.karpenter.k8s.aws, which will not be pruned W0407 01:59:25.342398 6053 pruning.go:115] manifest includes an object of GroupKind Provisioner.karpenter.sh, which will not be pruned I0407 01:59:25.367986 6053 executor.go:111] Tasks: 0 done / 122 total; 54 can run I0407 01:59:25.368491 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:25.368542 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:25.368653 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:25.371377 6053 executor.go:111] Tasks: 54 done / 122 total; 31 can run I0407 01:59:25.380756 6053 executor.go:111] Tasks: 85 done / 122 total; 29 can run I0407 01:59:25.381021 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.381226 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.381409 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.381563 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.382049 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.382199 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.382301 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.382371 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.382487 6053 executor.go:111] Tasks: 114 done / 122 total; 2 can run I0407 01:59:25.382797 6053 executor.go:111] Tasks: 116 done / 122 total; 6 can run I0407 01:59:25.383143 6053 executor.go:111] Tasks: 122 done / 122 total; 0 can run I0407 01:59:25.390501 6053 target.go:111] Terraform output is in /tmp/test442442562/out --- PASS: TestKarpenter (1.77s) === RUN TestSharedSubnet I0407 01:59:25.397387 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:25.397522 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:25.397566 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:25.397612 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:25.397652 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:25.397708 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:25.397750 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:25.397781 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:25.397819 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:25.397855 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:25.421999 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:25.424906 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:25.424985 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.760425 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:26.939175 6053 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0407 01:59:26.940566 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:26.940628 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:26.940823 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:26.946737 6053 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0407 01:59:26.947256 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:26.952615 6053 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0407 01:59:26.953237 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.953612 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.953822 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.954522 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.954641 6053 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0407 01:59:26.954934 6053 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0407 01:59:26.955302 6053 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0407 01:59:26.960105 6053 target.go:111] Terraform output is in /tmp/test2711945994/out --- PASS: TestSharedSubnet (1.57s) === RUN TestSharedVPC I0407 01:59:26.964722 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:26.964855 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:26.964898 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:26.964951 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:26.964993 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:26.965046 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:26.965115 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:26.965146 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:26.965185 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:26.965213 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:26.989119 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:26.992238 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:26.992324 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.269795 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:28.454639 6053 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0407 01:59:28.455911 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:28.455953 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:28.456083 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:28.457675 6053 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0407 01:59:28.458079 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:28.463595 6053 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0407 01:59:28.464103 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.464307 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.464723 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.464833 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.464946 6053 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0407 01:59:28.465309 6053 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0407 01:59:28.465626 6053 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0407 01:59:28.470583 6053 target.go:111] Terraform output is in /tmp/test107146659/out --- PASS: TestSharedVPC (1.51s) === RUN TestSharedVPCIPv6 I0407 01:59:28.475306 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:28.475459 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:28.475514 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:28.475593 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:28.475659 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:28.475748 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:28.475812 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:28.475873 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:28.475945 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:28.475994 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:28.478109 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:59:28.478178 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:28.510347 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 01:59:28.510419 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:28.510539 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 01:59:28.514610 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:28.514700 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:29.802763 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:29.979216 6053 executor.go:111] Tasks: 0 done / 133 total; 45 can run I0407 01:59:29.986152 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:29.986205 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:29.986330 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:29.987659 6053 executor.go:111] Tasks: 45 done / 133 total; 29 can run I0407 01:59:29.987977 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:29.988161 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 01:59:29.991062 6053 executor.go:111] Tasks: 74 done / 133 total; 37 can run I0407 01:59:29.991881 6053 executor.go:111] Tasks: 111 done / 133 total; 6 can run I0407 01:59:29.991976 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:59:29.992091 6053 loadbalancers.go:35] PageSize not implemented I0407 01:59:29.992249 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:59:29.992335 6053 loadbalancers.go:35] PageSize not implemented I0407 01:59:29.998831 6053 executor.go:111] Tasks: 117 done / 133 total; 8 can run I0407 01:59:29.999079 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:29.999272 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:29.999739 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:29.999826 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:29.999929 6053 executor.go:111] Tasks: 125 done / 133 total; 2 can run I0407 01:59:30.000226 6053 executor.go:111] Tasks: 127 done / 133 total; 6 can run I0407 01:59:30.000564 6053 executor.go:111] Tasks: 133 done / 133 total; 0 can run I0407 01:59:30.006876 6053 target.go:111] Terraform output is in /tmp/test3154192271/out --- PASS: TestSharedVPCIPv6 (1.54s) === RUN TestExistingIAM I0407 01:59:30.011709 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:30.011847 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:30.011895 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:30.011944 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:30.011986 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:30.012043 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:30.012086 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:30.012114 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:30.012153 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:30.012184 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:30.050928 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:30.054583 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:30.054729 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:30.054802 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:30.054863 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.372971 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:31.568691 6053 executor.go:111] Tasks: 0 done / 117 total; 51 can run I0407 01:59:31.570034 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:31.570089 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:31.570268 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:31.574316 6053 executor.go:111] Tasks: 51 done / 117 total; 19 can run I0407 01:59:31.583681 6053 executor.go:111] Tasks: 70 done / 117 total; 31 can run I0407 01:59:31.584386 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.584607 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.584889 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.584982 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.585186 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.585409 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.585505 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.585634 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.585749 6053 executor.go:111] Tasks: 101 done / 117 total; 4 can run I0407 01:59:31.586123 6053 executor.go:111] Tasks: 105 done / 117 total; 12 can run I0407 01:59:31.586499 6053 executor.go:111] Tasks: 117 done / 117 total; 0 can run I0407 01:59:31.593589 6053 target.go:111] Terraform output is in /tmp/test2623580791/out --- PASS: TestExistingIAM (1.59s) === RUN TestPhaseNetwork I0407 01:59:31.598783 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:31.598912 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:31.598957 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:31.599003 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:31.599045 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:31.599101 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:31.599149 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:31.599180 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:31.599220 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:31.599250 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:31.630367 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:31.633772 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.633930 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:31.634045 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:33.039406 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:33.228464 6053 executor.go:111] Tasks: 0 done / 135 total; 47 can run I0407 01:59:33.229265 6053 executor.go:111] Tasks: 47 done / 135 total; 30 can run I0407 01:59:33.229846 6053 executor.go:111] Tasks: 77 done / 135 total; 36 can run I0407 01:59:33.230501 6053 executor.go:111] Tasks: 113 done / 135 total; 6 can run I0407 01:59:33.230681 6053 executor.go:111] Tasks: 119 done / 135 total; 8 can run I0407 01:59:33.230867 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 01:59:33.230911 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 01:59:33.231000 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 01:59:33.231995 6053 target.go:111] Terraform output is in /tmp/test568962672/out --- PASS: TestPhaseNetwork (1.63s) === RUN TestExternalLoadBalancer I0407 01:59:33.232564 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:33.232694 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:33.232739 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:33.232790 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:33.232834 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:33.232887 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:33.232933 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:33.232966 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:33.233007 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:33.233040 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:33.257939 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:33.261154 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:33.261252 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.557357 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:34.737822 6053 executor.go:111] Tasks: 0 done / 107 total; 51 can run I0407 01:59:34.738427 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:34.738503 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:34.738679 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:34.741956 6053 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0407 01:59:34.751752 6053 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0407 01:59:34.751978 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.752465 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.753308 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.754192 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.754328 6053 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0407 01:59:34.754623 6053 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0407 01:59:34.754926 6053 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0407 01:59:34.760076 6053 target.go:111] Terraform output is in /tmp/test4033809465/out --- PASS: TestExternalLoadBalancer (1.53s) === RUN TestPhaseIAM integration_test.go:1062: unable to test w/o allowing failed validation --- SKIP: TestPhaseIAM (0.00s) === RUN TestPhaseCluster integration_test.go:1070: unable to test w/o allowing failed validation --- SKIP: TestPhaseCluster (0.00s) === RUN TestMixedInstancesASG I0407 01:59:34.764827 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:34.764953 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:34.764996 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:34.765047 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:34.765115 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:34.765170 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:34.765216 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:34.765245 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:34.765283 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:34.765313 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:34.797312 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:34.801121 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801210 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801273 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801333 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801381 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801429 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:34.801486 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.125197 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:36.319681 6053 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0407 01:59:36.321402 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:36.321438 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:36.321530 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:36.323735 6053 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0407 01:59:36.331406 6053 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0407 01:59:36.331948 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.332199 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.332446 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.332545 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.332789 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.332923 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.333012 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.333279 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.333406 6053 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0407 01:59:36.333883 6053 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0407 01:59:36.334298 6053 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0407 01:59:36.345259 6053 target.go:111] Terraform output is in /tmp/test533131826/out --- PASS: TestMixedInstancesASG (1.59s) === RUN TestMixedInstancesSpotASG I0407 01:59:36.351862 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:36.351999 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:36.352045 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:36.352099 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:36.352146 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:36.352203 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:36.352251 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:36.352280 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:36.352321 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:36.352352 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:36.384672 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:36.388189 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388272 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388329 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388402 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388472 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388509 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:36.388548 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.710899 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:37.895342 6053 executor.go:111] Tasks: 0 done / 127 total; 53 can run I0407 01:59:37.897598 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:37.897646 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:37.897750 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:37.900463 6053 executor.go:111] Tasks: 53 done / 127 total; 27 can run I0407 01:59:37.907227 6053 executor.go:111] Tasks: 80 done / 127 total; 31 can run I0407 01:59:37.907437 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.907593 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.907812 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.907977 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.908134 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.908211 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.908459 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.908595 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.908726 6053 executor.go:111] Tasks: 111 done / 127 total; 4 can run I0407 01:59:37.909168 6053 executor.go:111] Tasks: 115 done / 127 total; 12 can run I0407 01:59:37.909655 6053 executor.go:111] Tasks: 127 done / 127 total; 0 can run I0407 01:59:37.916606 6053 target.go:111] Terraform output is in /tmp/test2464150217/out --- PASS: TestMixedInstancesSpotASG (1.57s) === RUN TestAdditionalObjects I0407 01:59:37.922443 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:37.922565 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:37.922610 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:37.922684 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:37.922727 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:37.922779 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:37.922824 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:37.922861 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:37.922900 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:37.922931 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:37.954719 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0407 01:59:37.958043 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:37.958138 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.273145 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:39.441398 6053 executor.go:111] Tasks: 0 done / 104 total; 45 can run I0407 01:59:39.444038 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:39.444115 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:39.444211 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:39.447306 6053 executor.go:111] Tasks: 45 done / 104 total; 23 can run I0407 01:59:39.453897 6053 executor.go:111] Tasks: 68 done / 104 total; 28 can run I0407 01:59:39.454383 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.454661 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.454833 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.455407 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.455514 6053 executor.go:111] Tasks: 96 done / 104 total; 2 can run I0407 01:59:39.455804 6053 executor.go:111] Tasks: 98 done / 104 total; 6 can run I0407 01:59:39.456129 6053 executor.go:111] Tasks: 104 done / 104 total; 0 can run I0407 01:59:39.461755 6053 target.go:111] Terraform output is in /tmp/test1622124195/out --- PASS: TestAdditionalObjects (1.54s) === RUN TestContainerd I0407 01:59:39.466429 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:39.466558 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:39.466602 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:39.466649 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:39.466691 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:39.466743 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:39.466788 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:39.466821 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:39.466866 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:39.466895 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:39.490613 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:39.493792 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:39.493880 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:40.803261 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:40.982173 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:40.983534 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:40.983570 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:40.983666 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:40.985715 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:40.990562 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:40.990933 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:40.991190 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:40.991506 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:40.992217 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:40.992341 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:40.992648 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:40.992994 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:41.002620 6053 target.go:111] Terraform output is in /tmp/test1106807017/out --- PASS: TestContainerd (1.54s) === RUN TestContainerdCustom I0407 01:59:41.007134 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:41.007259 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:41.007304 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:41.007354 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:41.007396 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:41.007450 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:41.007492 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:41.007520 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:41.007557 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:41.007585 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:41.033584 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:41.036934 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.037024 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.572182 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:41.747615 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:41.748484 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:41.748550 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:41.748658 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:41.756148 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:41.764142 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:41.764543 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.764806 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.765094 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.765679 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.765820 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:41.766206 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:41.766604 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:41.771787 6053 target.go:111] Terraform output is in /tmp/test372590094/out --- PASS: TestContainerdCustom (0.77s) === RUN TestDockerCustom I0407 01:59:41.776380 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:41.776512 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:41.776560 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:41.776609 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:41.776653 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:41.776707 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:41.776751 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:41.776780 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:41.776823 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:41.776857 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:41.802824 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.23.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.23.17 ********************************************************************************* I0407 01:59:41.806285 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:41.806368 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.342780 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:42.513977 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:42.515322 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:42.515382 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:42.515521 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:42.518076 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:42.526091 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:42.526558 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.526853 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.527156 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.527586 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.527707 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:42.528048 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:42.528365 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:42.537151 6053 target.go:111] Terraform output is in /tmp/test1026594381/out --- PASS: TestDockerCustom (0.77s) === RUN TestAPIServerNodes I0407 01:59:42.541603 6053 featureflag.go:164] FeatureFlag "APIServerNodes"=true I0407 01:59:42.541632 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:42.541776 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:42.541822 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:42.541871 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:42.541913 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:42.541965 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:42.542009 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:42.542039 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:42.542077 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:42.542109 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:42.569211 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:59:42.572407 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.572496 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:42.572555 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:43.991958 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:44.174691 6053 executor.go:111] Tasks: 0 done / 114 total; 47 can run I0407 01:59:44.177020 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:44.177053 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:44.177162 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:44.179366 6053 executor.go:111] Tasks: 47 done / 114 total; 28 can run I0407 01:59:44.185310 6053 executor.go:111] Tasks: 75 done / 114 total; 27 can run I0407 01:59:44.185547 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.185906 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.186159 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.186277 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.186390 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.187016 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.187124 6053 executor.go:111] Tasks: 102 done / 114 total; 3 can run I0407 01:59:44.187512 6053 executor.go:111] Tasks: 105 done / 114 total; 9 can run I0407 01:59:44.188113 6053 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0407 01:59:44.198285 6053 target.go:111] Terraform output is in /tmp/test2867001864/out I0407 01:59:44.203650 6053 featureflag.go:164] FeatureFlag "APIServerNodes"=false --- PASS: TestAPIServerNodes (1.66s) === RUN TestNTHIMDSProcessor I0407 01:59:44.203801 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:44.203928 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:44.203973 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:44.204027 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:44.204071 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:44.204124 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:44.204171 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:44.204200 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:44.204237 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:44.204266 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:44.228722 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:44.231969 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:44.232056 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.536617 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:45.707009 6053 executor.go:111] Tasks: 0 done / 90 total; 44 can run I0407 01:59:45.708209 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:45.708252 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:45.708377 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:45.711452 6053 executor.go:111] Tasks: 44 done / 90 total; 19 can run I0407 01:59:45.717271 6053 executor.go:111] Tasks: 63 done / 90 total; 21 can run I0407 01:59:45.717669 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.717846 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.718364 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.718506 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.718625 6053 executor.go:111] Tasks: 84 done / 90 total; 2 can run I0407 01:59:45.718942 6053 executor.go:111] Tasks: 86 done / 90 total; 4 can run I0407 01:59:45.719256 6053 executor.go:111] Tasks: 90 done / 90 total; 0 can run I0407 01:59:45.723816 6053 target.go:111] Terraform output is in /tmp/test3116366326/out --- PASS: TestNTHIMDSProcessor (1.52s) === RUN TestNTHIMDSProcessorIRSA I0407 01:59:45.727928 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:45.728055 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:45.728099 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:45.728149 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:45.728189 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:45.728245 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:45.728287 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:45.728315 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:45.728356 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:45.728403 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:45.753289 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:45.756495 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:45.756575 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.061510 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:47.267588 6053 executor.go:111] Tasks: 0 done / 101 total; 50 can run I0407 01:59:47.270573 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:47.270612 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:47.270722 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:47.275977 6053 executor.go:111] Tasks: 50 done / 101 total; 24 can run I0407 01:59:47.281927 6053 executor.go:111] Tasks: 74 done / 101 total; 21 can run I0407 01:59:47.282264 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.282429 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.282752 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.283269 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.283395 6053 executor.go:111] Tasks: 95 done / 101 total; 2 can run I0407 01:59:47.283719 6053 executor.go:111] Tasks: 97 done / 101 total; 4 can run I0407 01:59:47.284058 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:47.289773 6053 target.go:111] Terraform output is in /tmp/test1517240266/out --- PASS: TestNTHIMDSProcessorIRSA (1.57s) === RUN TestCustomIRSA I0407 01:59:47.295081 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:47.295215 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:47.295258 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:47.295308 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:47.295350 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:47.295403 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:47.295449 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:47.295480 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:47.295520 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:47.295555 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:47.324109 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:47.327754 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:47.327839 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:48.607174 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:49.276525 6053 executor.go:111] Tasks: 0 done / 114 total; 52 can run I0407 01:59:49.278371 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:49.278416 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:49.278499 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:49.281323 6053 executor.go:111] Tasks: 52 done / 114 total; 29 can run I0407 01:59:49.290456 6053 executor.go:111] Tasks: 81 done / 114 total; 25 can run I0407 01:59:49.290766 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:49.291239 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:49.292007 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:49.292853 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:49.292985 6053 executor.go:111] Tasks: 106 done / 114 total; 2 can run I0407 01:59:49.293348 6053 executor.go:111] Tasks: 108 done / 114 total; 6 can run I0407 01:59:49.293816 6053 executor.go:111] Tasks: 114 done / 114 total; 0 can run I0407 01:59:49.301145 6053 target.go:111] Terraform output is in /tmp/test1590358700/out --- PASS: TestCustomIRSA (2.02s) === RUN TestClusterNameDigit I0407 01:59:49.310401 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:49.310534 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:49.310579 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:49.310626 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:49.310668 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:49.310725 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:49.310768 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:49.310798 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:49.310835 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:49.310865 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:49.337285 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 01:59:49.340343 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:49.340419 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.631225 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:50.815896 6053 executor.go:111] Tasks: 0 done / 109 total; 49 can run I0407 01:59:50.818224 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:50.818260 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:50.818361 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:50.821477 6053 executor.go:111] Tasks: 49 done / 109 total; 27 can run I0407 01:59:50.827098 6053 executor.go:111] Tasks: 76 done / 109 total; 25 can run I0407 01:59:50.827468 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.827656 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.828092 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.828186 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.828281 6053 executor.go:111] Tasks: 101 done / 109 total; 2 can run I0407 01:59:50.828564 6053 executor.go:111] Tasks: 103 done / 109 total; 6 can run I0407 01:59:50.828994 6053 executor.go:111] Tasks: 109 done / 109 total; 0 can run I0407 01:59:50.839587 6053 target.go:111] Terraform output is in /tmp/test831048155/out --- PASS: TestClusterNameDigit (1.53s) === RUN TestCASPriorityExpander I0407 01:59:50.844934 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:50.845158 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:50.845224 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:50.845278 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:50.845323 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:50.845378 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:50.845423 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:50.845452 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:50.845493 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:50.845519 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:50.874615 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:59:50.878184 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.878273 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.878328 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:50.878406 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:59:53.078146 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:53.275912 6053 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0407 01:59:53.277701 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:53.277729 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:53.277822 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:53.279631 6053 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0407 01:59:53.283948 6053 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0407 01:59:53.284132 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.284388 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.284678 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.284902 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.285103 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.285220 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.285293 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.285419 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.285533 6053 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0407 01:59:53.285848 6053 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0407 01:59:53.286258 6053 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0407 01:59:53.297102 6053 target.go:111] Terraform output is in /tmp/test441130381/out --- PASS: TestCASPriorityExpander (2.46s) === RUN TestCASPriorityExpanderCustom I0407 01:59:53.303029 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:53.303158 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:53.303203 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:53.303255 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:53.303302 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:53.303359 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:53.303403 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:53.303433 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:53.303475 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:53.303504 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:59:53.334374 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* I0407 01:59:53.337935 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.338015 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.338065 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:53.338114 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:59:54.637626 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:54.836415 6053 executor.go:111] Tasks: 0 done / 116 total; 46 can run I0407 01:59:54.837640 6053 dnszone.go:241] Check for existing route53 zone to re-use with name "" I0407 01:59:54.837694 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:54.837792 6053 dnszone.go:248] Existing zone "example.com." found; will configure TF to reuse I0407 01:59:54.839582 6053 executor.go:111] Tasks: 46 done / 116 total; 25 can run I0407 01:59:54.845277 6053 executor.go:111] Tasks: 71 done / 116 total; 29 can run I0407 01:59:54.845524 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.845775 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846020 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846256 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846488 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846583 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846782 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.846969 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.847088 6053 executor.go:111] Tasks: 100 done / 116 total; 4 can run I0407 01:59:54.847526 6053 executor.go:111] Tasks: 104 done / 116 total; 12 can run I0407 01:59:54.849091 6053 executor.go:111] Tasks: 116 done / 116 total; 0 can run I0407 01:59:54.858885 6053 target.go:111] Terraform output is in /tmp/test736682666/out --- PASS: TestCASPriorityExpanderCustom (1.56s) === RUN TestLifecycleMinimalAWS I0407 01:59:54.864849 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:59:54.864980 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 01:59:54.865025 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:59:54.865106 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:59:54.865152 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:59:54.865206 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:59:54.865252 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:59:54.865281 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:59:54.865322 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:59:54.865357 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0407 01:59:54.888231 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:59:54.891299 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:54.891383 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:59:56.272809 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:56.444498 6053 iamrole.go:89] ListRoles: { } I0407 01:59:56.447431 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:56.447718 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.447835 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:56.447912 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.448205 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.448327 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0407 01:59:56.448425 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] } I0407 01:59:56.448477 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0407 01:59:56.448620 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 01:59:56.448704 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0407 01:59:56.448817 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] } I0407 01:59:56.448680 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 01:59:56.448925 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 01:59:56.448984 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 01:59:56.449129 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 01:59:56.449183 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 01:59:56.449369 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 01:59:56.449600 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.449791 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0407 01:59:56.449882 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 01:59:56.449940 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 01:59:56.449975 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:59:56.450015 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:56.451160 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:56.451466 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0407 01:59:56.451431 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.451586 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.451698 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 01:59:56.451734 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 01:59:56.451830 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0407 01:59:56.451775 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0407 01:59:56.451911 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0407 01:59:56.451997 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 01:59:56.452061 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.452191 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 01:59:56.452205 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 01:59:56.452248 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:56.452438 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:56.452452 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], VpcId: "vpc-1" } I0407 01:59:56.452580 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:59:56.452627 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:59:56.452671 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 01:59:56.452727 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:56.452910 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 01:59:56.452992 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] } I0407 01:59:56.453091 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 01:59:56.453134 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0407 01:59:56.453327 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] }], VpcId: "vpc-1" } I0407 01:59:56.453441 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 01:59:56.453497 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 01:59:56.453540 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 01:59:56.453615 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 01:59:56.453655 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 01:59:56.453532 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 01:59:56.457069 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:56.457244 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:56.457442 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 01:59:56.457510 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:56.457698 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.457984 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" }] }] } I0407 01:59:56.458148 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:56.458288 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 01:59:56.458355 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:56.458557 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.458726 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.458874 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.459015 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:56.459115 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 01:59:56.459156 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.459290 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:56.459351 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 01:59:56.459536 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.459681 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" }] }] } I0407 01:59:56.459812 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" }] }] } I0407 01:59:56.459947 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" }] }] } I0407 01:59:56.460082 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 01:59:56.460130 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" }] }] } I0407 01:59:56.460265 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:56.460421 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 01:59:56.460599 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 01:59:56.460963 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:56.461268 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:56.461520 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:56.461572 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:56.461613 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 01:59:56.461688 6053 dns.go:235] Pre-creating DNS records I0407 01:59:56.461735 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 01:59:56.467438 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.27.5 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.27.5 ********************************************************************************* I0407 01:59:56.470491 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:56.470578 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } ********************************************************************************* Kubelet anonymousAuth is currently turned on. This allows RBAC escalation and remote code execution possibilities. It is highly recommended you turn it off by setting 'spec.kubelet.anonymousAuth' to 'false' via 'kops edit cluster' See https://kops.sigs.k8s.io/security/#kubelet-api ********************************************************************************* I0407 01:59:57.882123 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:58.061278 6053 iamrole.go:89] ListRoles: { } I0407 01:59:58.062702 6053 executor.go:111] Tasks: 0 done / 101 total; 45 can run I0407 01:59:58.063161 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0407 01:59:58.063235 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 01:59:58.063781 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 01:59:58.064025 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.064621 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.064888 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.065081 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:59:58.065152 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:59:58.065248 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:58.066635 6053 executor.go:111] Tasks: 45 done / 101 total; 23 can run I0407 01:59:58.066771 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:58.066845 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0407 01:59:58.066883 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0407 01:59:58.067005 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0407 01:59:58.067053 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:59:58.067176 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 01:59:58.067233 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0407 01:59:58.067409 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 01:59:58.067486 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.067619 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.067765 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:59:58.067812 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.072490 6053 executor.go:111] Tasks: 68 done / 101 total; 25 can run I0407 01:59:58.072724 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:58.072875 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:58.073085 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:58.073229 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:58.073442 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 01:59:58.073705 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:58.073854 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 01:59:58.074313 6053 executor.go:111] Tasks: 93 done / 101 total; 2 can run I0407 01:59:58.074617 6053 executor.go:111] Tasks: 95 done / 101 total; 6 can run I0407 01:59:58.074862 6053 executor.go:111] Tasks: 101 done / 101 total; 0 can run I0407 01:59:58.077431 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 01:59:58.077499 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 01:59:58.077539 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 01:59:58.077573 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 01:59:58.077607 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 01:59:58.077639 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 01:59:58.077670 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 01:59:58.077705 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 01:59:58.077737 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 01:59:58.077778 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 01:59:58.077814 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 01:59:58.077846 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 01:59:58.077874 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 01:59:58.077907 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 01:59:58.077937 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 01:59:58.077968 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 01:59:58.078002 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:59:58.078034 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 01:59:58.078064 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 01:59:58.078092 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 01:59:58.078122 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 01:59:58.078156 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 01:59:58.078193 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:59:58.078227 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 01:59:58.079484 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 01:59:58.079587 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 01:59:58.079609 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 01:59:58.079651 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079698 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0407 01:59:58.079752 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079810 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079862 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079913 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079956 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.079995 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0407 01:59:58.080043 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.080092 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 01:59:58.080133 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0407 01:59:58.080179 6053 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0407 01:59:58.080214 6053 api.go:53] PageSize not implemented I0407 01:59:58.080240 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 01:59:58.080268 6053 loadbalancers.go:35] PageSize not implemented I0407 01:59:58.080288 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 01:59:58.080319 6053 targetgroups.go:35] PageSize not implemented I0407 01:59:58.080339 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 01:59:58.080396 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 01:59:58.080446 6053 iamrole.go:89] ListRoles: { } I0407 01:59:58.080493 6053 zones.go:93] ListHostedZonesPages { } I0407 01:59:58.080523 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 01:59:58.080564 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 01:59:58.080609 6053 routetable.go:53] DescribeRouteTables: { } I0407 01:59:58.080643 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0407 01:59:58.081204 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:nodes.minimal.example.com ok I0407 01:59:58.081306 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 01:59:58.081271 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0407 01:59:58.081448 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 01:59:58.081421 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 01:59:58.081483 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 01:59:58.081493 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0407 01:59:58.081359 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 01:59:58.081528 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0407 01:59:58.081553 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0407 01:59:58.081593 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0407 01:59:58.081647 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 01:59:58.081761 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 01:59:58.081831 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 } ] } W0407 01:59:58.082030 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 01:59:58.082055 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 01:59:58.082093 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 01:59:58.082172 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok autoscaling-config:lt-2 ok I0407 01:59:58.082293 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0407 01:59:58.082347 6053 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0407 01:59:58.082322 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 01:59:58.082364 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 01:59:58.082431 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0407 01:59:58.082477 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0407 01:59:58.082528 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0407 01:59:58.082543 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 01:59:58.082571 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0407 01:59:58.082640 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 01:59:58.082727 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 01:59:58.082806 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleMinimalAWS (3.22s) === RUN TestLifecycleMinimalOpenstack I0407 01:59:58.083260 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster minimal-openstack.k8s.local I0407 01:59:58.091176 6053 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 01:59:59.562780 6053 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0407 01:59:59.562824 6053 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0407 01:59:59.580507 6053 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/04/07 01:59:59 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 01:59:59 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0407 01:59:59.587122 6053 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0407 01:59:59.599394 6053 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0407 01:59:59.603221 6053 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/04/07 01:59:59 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 01:59:59 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 01:59:59 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0407 01:59:59.606625 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 01:59:59.606625 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0407 02:00:00.612666 6053 executor.go:111] Tasks: 92 done / 92 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 02:00:02.061244 6053 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0407 02:00:02.061295 6053 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0407 02:00:02.082022 6053 executor.go:111] Tasks: 0 done / 92 total; 41 can run 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0407 02:00:02.086801 6053 executor.go:111] Tasks: 41 done / 92 total; 43 can run I0407 02:00:02.099469 6053 executor.go:111] Tasks: 84 done / 92 total; 5 can run I0407 02:00:02.101128 6053 executor.go:111] Tasks: 89 done / 92 total; 3 can run 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0407 02:00:02.104191 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 02:00:02.104390 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0407 02:00:02.104882 6053 executor.go:111] Tasks: 92 done / 92 total; 0 can run I0407 02:00:02.106430 6053 delete_cluster.go:128] Looking for cloud resources to delete 2024/04/07 02:00:02 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) SecurityGroup:b68a43ee-b9b1-4ef3-870f-69c094e8ccc1 ok Port:0db9f071-4149-4e2d-8dde-06ed42f16fc9 ok Instance:55addfc6-624e-4839-89ad-9ca53a3fe129 ok SecurityGroup:82b76070-073c-4fa2-88f8-c9c03fbe15cb ok Port:8abb485f-9ff7-4f85-96a0-f97ce5868ec6 ok Instance:2466eb76-171e-4a2e-9afa-5e06cc630873 ok Instance:89199ff7-703e-48b7-8fea-a047f9fec6b1 ok ServerGroup:4ead1eb4-206b-488f-bf57-4af8cd7362ec ok SSHKey:kubernetes-minimal-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok Network:bb16e86f-32e0-4c63-9929-d645e130424f ok SecurityGroup:dfca29b7-eef7-4e54-a379-9a95a86dba48 ok Subnet:5ef41a44-0987-4700-975d-8906c202be81 ok ServerGroup:08f041eb-daca-4142-a61c-c053ff51991d ok Port:27e35efb-4eb6-4ee9-984e-9eff9f7c4d44 ok --- PASS: TestLifecycleMinimalOpenstack (5.14s) === RUN TestLifecycleMinimalGCE I0407 02:00:03.218730 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:479: running lifecycle test for cluster minimal-gce.example.com I0407 02:00:03.220536 6053 network.go:238] assigned 10.0.16.0/20 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 02:00:04.980517 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 02:00:04.980628 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 02:00:04.980768 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0407 02:00:04.980798 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0407 02:00:04.980823 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0407 02:00:04.980899 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 02:00:04.982374 6053 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0407 02:00:04.986268 6053 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0407 02:00:04.996172 6053 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0407 02:00:04.997098 6053 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0407 02:00:04.997544 6053 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0407 02:00:04.997712 6053 dns.go:235] Pre-creating DNS records ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 02:00:06.697321 6053 external_access.go:39] TODO: Harmonize gcemodel ExternalAccessModelBuilder with awsmodel W0407 02:00:06.697417 6053 firewall.go:41] TODO: Harmonize gcemodel with awsmodel for firewall - GCE model is way too open W0407 02:00:06.697512 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/main" W0407 02:00:06.697538 6053 storageacl.go:153] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com/backups/etcd/events" W0407 02:00:06.697559 6053 storageacl.go:189] unknown path, can't apply IAM policy: "memfs://tests/minimal-gce.example.com" W0407 02:00:06.697628 6053 autoscalinggroup.go:151] enabling storage-rw for etcd backups I0407 02:00:06.698968 6053 executor.go:111] Tasks: 0 done / 64 total; 41 can run I0407 02:00:06.704483 6053 executor.go:111] Tasks: 41 done / 64 total; 17 can run I0407 02:00:06.712076 6053 executor.go:111] Tasks: 58 done / 64 total; 4 can run I0407 02:00:06.713212 6053 executor.go:111] Tasks: 62 done / 64 total; 2 can run I0407 02:00:06.713368 6053 executor.go:111] Tasks: 64 done / 64 total; 0 can run I0407 02:00:06.714964 6053 delete_cluster.go:128] Looking for cloud resources to delete I0407 02:00:06.715030 6053 gce.go:99] Scanning zones: [us-test1-a] I0407 02:00:06.715409 6053 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" I0407 02:00:06.715436 6053 gce.go:1077] backend services not found, assuming none exist in project: "testproject" region: "us-test1" FirewallRule:node-to-node-minimal-gce-example-com ok InstanceGroupManager:us-test1-a/a-nodes-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/control-plane-minimal-g-fu1mg6@testproject.iam.gserviceaccount.com ok InstanceGroupManager:us-test1-a/a-master-us-test1-a-minimal-gce-example-com ok Disk:a-etcd-main-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:ssh-external-to-master-minimal-gce-example-com ok FirewallRule:kubernetes-master-https-minimal-gce-example-com ok Disk:a-etcd-events-minimal-gce-example-com ok ServiceAccount:projects/testproject/serviceAccounts/node-minimal-gce-example-com@testproject.iam.gserviceaccount.com ok FirewallRule:node-to-master-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-minimal-gce-example-com ok FirewallRule:nodeport-external-to-node-ipv6-minimal-gce-example-com ok FirewallRule:master-to-node-minimal-gce-example-com ok FirewallRule:master-to-master-minimal-gce-example-com ok InstanceTemplate:nodes-minimal-gce-example-com-1712455204 ok InstanceTemplate:master-us-test1-a-minimal-do16cp-1712455204 ok Subnet:us-test1-minimal-gce-example-com ok Network:minimal-gce-example-com ok --- PASS: TestLifecycleMinimalGCE (3.50s) === RUN TestLifecycleFloatingIPOpenstack I0407 02:00:06.716816 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false lifecycle_integration_test.go:426: running lifecycle test for cluster floatingip-openstack.k8s.local I0407 02:00:06.725440 6053 subnets.go:224] Assigned CIDR 192.168.0.0/16 to subnet us-test1 ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 02:00:08.206886 6053 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0407 02:00:08.206922 6053 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0407 02:00:08.218718 6053 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/04/07 02:00:08 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:08 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0407 02:00:08.231437 6053 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0407 02:00:08.240045 6053 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0407 02:00:08.242980 6053 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/04/07 02:00:08 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:08 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:08 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0407 02:00:08.247942 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 02:00:08.248259 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 02:00:08.248609 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0407 02:00:09.256885 6053 executor.go:111] Tasks: 94 done / 94 total; 0 can run ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* W0407 02:00:10.679901 6053 pruning.go:115] manifest includes an object of GroupKind CSIDriver.storage.k8s.io, which will not be pruned W0407 02:00:10.679951 6053 pruning.go:115] manifest includes an object of GroupKind StorageClass.storage.k8s.io, which will not be pruned I0407 02:00:10.700103 6053 executor.go:111] Tasks: 0 done / 94 total; 42 can run 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) I0407 02:00:10.710819 6053 executor.go:111] Tasks: 42 done / 94 total; 43 can run I0407 02:00:10.718746 6053 executor.go:111] Tasks: 85 done / 94 total; 6 can run I0407 02:00:10.720444 6053 executor.go:111] Tasks: 91 done / 94 total; 3 can run 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) W0407 02:00:10.723325 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 02:00:10.723878 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. W0407 02:00:10.724103 6053 bootstrapscript.go:159] exporting username and password. Consider using application credentials instead. I0407 02:00:10.724447 6053 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0407 02:00:10.726122 6053 delete_cluster.go:128] Looking for cloud resources to delete 2024/04/07 02:00:10 http: superfluous response.WriteHeader call from k8s.io/kops/cloudmock/openstack/mockcompute.(*MockClient).getServer (servers.go:167) Router-IF:4ea70a1d-0050-4031-b7ee-a4ca3ae0b3b0 ok Instance:ca750916-367e-4fcf-8b0e-e038ff1c6ecc ok ServerGroup:72a0720d-2180-4e3f-a48e-0945be17b802 ok Port:42ff09fd-e628-4490-b1dc-ca3049f6496a ok SecurityGroup:7d813d41-be57-47c1-abf1-bbbed829679d ok Network:6b018149-4cd1-44d1-8557-dcc3a70655fb ok Port:ba6bf538-3d03-48bc-a909-4c289ecc4f01 ok Port:c4a0a24f-e7dd-455c-9b68-458c33d71b7b ok Subnet:4ea70a1d-0050-4031-b7ee-a4ca3ae0b3b0 ok Instance:37e15bb1-20fc-4798-b998-e9cf3b1ed570 ok Port:24b19c3a-6870-48b8-8036-abd4bb128b17 ok ServerGroup:6419efde-ead9-4bcc-bd19-9869a354f5b2 ok Router:47d2804f-55b1-48d0-937d-1ccf91fa6899 ok Instance:a4aafd49-7ca6-47e8-a7b5-24aa6a269ae0 ok SecurityGroup:e219a2d1-f9da-4d62-8958-4784c395b477 ok SSHKey:kubernetes-floatingip-openstack-k8s-local-c4_a6_ed_9a_a8_89_b9_e2_c3_9c_d6_63_eb_9c_71_57 ok SecurityGroup:10c1506c-6d1a-42a5-8c84-f4d9177026a1 ok --- PASS: TestLifecycleFloatingIPOpenstack (5.12s) === RUN TestLifecyclePrivateCalico I0407 02:00:11.835579 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:11.835735 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:11.835788 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:11.835842 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:11.835889 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:11.835945 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:11.835988 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:11.836015 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:11.836052 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:11.836082 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatecalico.example.com I0407 02:00:11.864209 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 02:00:11.867870 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:11.867959 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:11.868017 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.148633 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:13.566350 6053 iamrole.go:89] ListRoles: { } I0407 02:00:13.568711 6053 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0407 02:00:13.569459 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } I0407 02:00:13.569585 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", Tags: [{ Key: "Name", Value: "bastions.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0407 02:00:13.569730 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } I0407 02:00:13.569804 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0407 02:00:13.569862 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:13.569931 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] }] } I0407 02:00:13.570113 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.570259 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.570288 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } I0407 02:00:13.570426 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", Tags: [{ Key: "Name", Value: "masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] } I0407 02:00:13.570438 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.570709 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.570723 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.570884 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:13.570948 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:13.571002 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:13.571063 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:13.571120 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:13.571258 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:13.571307 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:13.571357 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatecalico.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:13.571482 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:13.571527 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:13.571683 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.572166 6053 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0407 02:00:13.572317 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0407 02:00:13.572434 6053 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0407 02:00:13.572323 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0407 02:00:13.572657 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0407 02:00:13.572599 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0407 02:00:13.572702 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0407 02:00:13.572548 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.572759 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0407 02:00:13.572875 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0407 02:00:13.572831 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatecalico-exa-hocohm", Port: 22, Protocol: "TCP", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-privatecalico-exa-hocohm" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0407 02:00:13.572924 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0407 02:00:13.572900 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.572915 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:13.573003 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0407 02:00:13.573115 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0407 02:00:13.573077 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0407 02:00:13.573354 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:13.573480 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:13.573553 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:13.573631 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:13.573798 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:13.573785 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0407 02:00:13.573941 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:13.574007 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0407 02:00:13.574221 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0407 02:00:13.574108 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatecalico.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatecalico.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ecr:BatchCheckLayerAvailability\",\n \"ecr:BatchGetImage\",\n \"ecr:DescribeRepositories\",\n \"ecr:GetAuthorizationToken\",\n \"ecr:GetDownloadUrlForLayer\",\n \"ecr:GetRepositoryPolicy\",\n \"ecr:ListImages\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatecalico.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0407 02:00:13.574464 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:13.574649 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.574805 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:13.574973 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:13.575158 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.575306 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:13.575475 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:13.575554 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatecalico.example.com" } ] } I0407 02:00:13.575606 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:13.575669 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatecalico.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatecalico.example.com" }] }], VpcId: "vpc-1" } I0407 02:00:13.575784 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:13.575861 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.575986 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:13.576046 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:13.576105 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:13.576174 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:13.576224 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0407 02:00:13.576410 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:13.576507 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:13.576574 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:13.576392 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0407 02:00:13.576665 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:13.576745 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:13.576799 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:13.576857 6053 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatecalico.example.com" }, { Key: "KubernetesCluster", Value: "privatecalico.example.com" }, { Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" } ] } I0407 02:00:13.576959 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:13.577029 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:13.577131 6053 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0407 02:00:13.577347 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0407 02:00:13.577381 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:13.577583 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:13.577516 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0407 02:00:13.577683 6053 api.go:53] PageSize not implemented I0407 02:00:13.577646 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.577820 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.577711 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatecalico-exa-hocohm", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }], Type: "network" } I0407 02:00:13.577905 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:13.577882 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:13.577975 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1", Port: 22, Protocol: "TCP" } I0407 02:00:13.578024 6053 tags.go:74] AddTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"], Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "api.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] } I0407 02:00:13.578102 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:13.578139 6053 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatecalico-example-0uch4k" } I0407 02:00:13.578204 6053 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatecalico-example-0uch4k" } W0407 02:00:13.578287 6053 api.go:53] PageSize not implemented I0407 02:00:13.578308 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:13.578202 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:13.578464 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:13.578526 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-4-0to0-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.578698 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:13.578776 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.578909 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" }] }] } I0407 02:00:13.579077 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:13.579156 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.579317 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:13.579401 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:13.579447 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.579508 6053 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.579584 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.579721 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:13.579821 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0407 02:00:13.579920 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.580045 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 02:00:13.580170 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.580304 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0407 02:00:13.580343 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-1to2379-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.580473 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0407 02:00:13.580571 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatecalico.example.com" }] }] } I0407 02:00:13.580704 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatecalico.example.com-ingress-all-0to0-masters.privatecalico.example.com" }] }] } I0407 02:00:13.580834 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-ingress-tcp-22to22-nodes.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.580964 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-4003to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.581101 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:13.581148 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-::/0" }] }] } I0407 02:00:13.581276 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-tcp-2382to4000-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.581414 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.581540 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.581662 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatecalico.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.581808 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.privatecalico.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 02:00:13.581930 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.582058 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:13.582102 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:13.582202 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatecalico.example.com-ingress-udp-1to65535-masters.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.582356 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-api-elb.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" },{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" }] }] } I0407 02:00:13.582494 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0407 02:00:13.582582 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0407 02:00:13.582674 6053 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0407 02:00:13.582816 6053 api.go:53] PageSize not implemented I0407 02:00:13.582876 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:13.582901 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0407 02:00:13.582942 6053 api.go:53] PageSize not implemented I0407 02:00:13.582779 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:13.583004 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:13.583028 6053 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:13.583049 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:13.583269 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:13.583235 6053 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "kubernetes.io/cluster/privatecalico.example.com", Value: "owned" },{ Key: "Name", Value: "us-test-1a.privatecalico.example.com" },{ Key: "KubernetesCluster", Value: "privatecalico.example.com" }] }] } I0407 02:00:13.583363 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:13.583430 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:13.583503 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:13.583554 6053 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0407 02:00:13.588531 6053 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0407 02:00:13.588732 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.588845 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.588924 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:13.589083 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0407 02:00:13.589231 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.589333 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.589806 6053 executor.go:111] Tasks: 134 done / 142 total; 2 can run I0407 02:00:13.590078 6053 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0407 02:00:13.590451 6053 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0407 02:00:13.590508 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:13.590550 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:13.590624 6053 dns.go:235] Pre-creating DNS records I0407 02:00:13.590652 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:13.597060 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 02:00:13.600650 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.600734 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:13.600799 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:14.905368 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:15.326995 6053 iamrole.go:89] ListRoles: { } I0407 02:00:15.329088 6053 executor.go:111] Tasks: 0 done / 142 total; 49 can run I0407 02:00:15.329375 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.329447 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:15.329551 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:15.329587 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:15.329659 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:15.329731 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatecalico.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:15.329944 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.330145 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatecalico.example.com"] }] } I0407 02:00:15.330375 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.333175 6053 executor.go:111] Tasks: 49 done / 142 total; 30 can run I0407 02:00:15.333337 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatecalico.example.com"] } ] } I0407 02:00:15.333447 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.privatecalico.example.com I0407 02:00:15.333433 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatecalico-exa-hocohm"] } I0407 02:00:15.333548 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0407 02:00:15.333485 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.333612 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } I0407 02:00:15.333603 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.privatecalico.example.com I0407 02:00:15.333665 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.333765 6053 iamrole.go:161] ListAttachedRolePolicies: masters.privatecalico.example.com I0407 02:00:15.333812 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:15.333888 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatecalico.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.334033 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:15.334093 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatecalico.example.com"] } ] } I0407 02:00:15.334310 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:15.334364 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.privatecalico.example.com"] }] } I0407 02:00:15.334470 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatecalico.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatecalico.example.com"] } ] } I0407 02:00:15.334619 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:15.334675 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }, { Name: "tag:Name", Values: ["masters.privatecalico.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatecalico.example.com"] } ] } I0407 02:00:15.334884 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:15.334975 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.privatecalico.example.com"] }] } I0407 02:00:15.335198 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:15.335299 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:15.335410 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:15.335739 6053 executor.go:111] Tasks: 79 done / 142 total; 41 can run I0407 02:00:15.335900 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:15.335994 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:15.336043 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0407 02:00:15.336099 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } W0407 02:00:15.336118 6053 api.go:53] PageSize not implemented I0407 02:00:15.336126 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:15.336221 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:15.336198 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.336323 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.336257 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0407 02:00:15.336436 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0407 02:00:15.336361 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.336376 6053 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatecalico-example-0uch4k" } I0407 02:00:15.336556 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.336495 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0407 02:00:15.336694 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4"] } I0407 02:00:15.336771 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } W0407 02:00:15.336904 6053 api.go:53] PageSize not implemented I0407 02:00:15.336943 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.337053 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:15.337367 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:15.337492 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:15.337769 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:15.337883 6053 executor.go:111] Tasks: 120 done / 142 total; 6 can run W0407 02:00:15.337952 6053 api.go:53] PageSize not implemented I0407 02:00:15.338014 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.338000 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:15.338082 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0407 02:00:15.338108 6053 api.go:53] PageSize not implemented I0407 02:00:15.338019 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:15.338154 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.338189 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:15.338227 6053 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0407 02:00:15.338174 6053 dnsname.go:118] AliasTarget for "api.privatecalico.example.com" is "api-privatecalico-example-0uch4k.elb.cloudmock.com" I0407 02:00:15.338251 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.338352 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.343580 6053 executor.go:111] Tasks: 126 done / 142 total; 8 can run I0407 02:00:15.343746 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:15.343860 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.344008 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.344089 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.344262 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.345010 6053 executor.go:111] Tasks: 134 done / 142 total; 2 can run W0407 02:00:15.345133 6053 api.go:53] PageSize not implemented I0407 02:00:15.345159 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.345363 6053 executor.go:111] Tasks: 136 done / 142 total; 6 can run I0407 02:00:15.345614 6053 executor.go:111] Tasks: 142 done / 142 total; 0 can run I0407 02:00:15.349043 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:15.349109 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:15.349149 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:15.349182 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0407 02:00:15.349218 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:15.349251 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:15.349283 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:15.349316 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:15.349349 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:15.349384 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:15.349419 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:15.349455 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0407 02:00:15.349497 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:15.349532 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:15.349561 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:15.349592 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:15.349624 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:15.349654 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:15.349688 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:15.349722 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:15.349756 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:15.349789 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:15.349822 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:15.349858 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:15.349892 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:15.349929 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:15.349960 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:15.349993 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:15.350029 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:15.350065 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:15.350101 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:15.351587 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:15.351659 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:15.351681 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:15.351751 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.351814 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0407 02:00:15.351888 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.351958 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352011 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352064 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352108 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352152 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } I0407 02:00:15.352215 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352268 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:15.352298 6053 natgateway.go:117] DescribeNatGateways: { } I0407 02:00:15.352335 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatecalico.example.com"] }] } I0407 02:00:15.352375 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatecalico.example.com"] }] } W0407 02:00:15.352428 6053 api.go:53] PageSize not implemented I0407 02:00:15.352447 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatecalico-example-0uch4k"] } I0407 02:00:15.352488 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:15.352515 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:15.352531 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1"] } I0407 02:00:15.352570 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:15.352600 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:15.352617 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0407 02:00:15.352676 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:15.352719 6053 iamrole.go:89] ListRoles: { } I0407 02:00:15.352774 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:15.352805 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:15.352851 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:15.352905 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:15.352952 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0407 02:00:15.352992 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:15.353026 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0407 02:00:15.353643 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatecalico-exa-hocohm/4 ok I0407 02:00:15.353689 6053 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0407 02:00:15.353773 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1" } I0407 02:00:15.353786 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:15.353765 6053 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatecalico-example-0uch4k" } load-balancer:api-privatecalico-example-0uch4k ok I0407 02:00:15.353824 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } autoscaling-group:master-us-test-1a.masters.privatecalico.example.com ok autoscaling-group:nodes.privatecalico.example.com ok autoscaling-group:bastion.privatecalico.example.com ok I0407 02:00:15.353849 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0407 02:00:15.353984 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:15.353931 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatecalico-exa-hocohm/1 ok I0407 02:00:15.354063 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatecalico.example.com" } iam-instance-profile:nodes.privatecalico.example.com ok I0407 02:00:15.354006 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0407 02:00:15.354118 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatecalico.example.com" } iam-instance-profile:masters.privatecalico.example.com ok I0407 02:00:15.353871 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatecalico.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatecalico-example-0uch4k.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatecalico.example.com", Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.privatecalico.example.com ok I0407 02:00:15.354165 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:15.354176 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0407 02:00:15.354220 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:15.354248 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatecalico.example.com" } iam-instance-profile:bastions.privatecalico.example.com ok I0407 02:00:15.354279 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0407 02:00:15.354460 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:15.354483 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-2 ok I0407 02:00:15.354538 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:15.354596 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:15.354650 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { IpProtocol: "4", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0407 02:00:15.354883 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:15.354906 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0407 02:00:15.354942 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:15.355006 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:15.355093 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok autoscaling-config:lt-3 ok I0407 02:00:15.355215 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:15.355249 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatecalico.example.com" } I0407 02:00:15.355317 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.privatecalico.example.com I0407 02:00:15.355335 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatecalico.example.com", RoleName: "nodes.privatecalico.example.com" } I0407 02:00:15.355370 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatecalico.example.com" } I0407 02:00:15.355269 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 } ] } iam-role:nodes.privatecalico.example.com ok W0407 02:00:15.355408 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:15.355428 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:15.355418 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatecalico.example.com" } I0407 02:00:15.355500 6053 iamrole.go:180] ListAttachedRolePolicies: masters.privatecalico.example.com I0407 02:00:15.355518 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatecalico.example.com", RoleName: "masters.privatecalico.example.com" } I0407 02:00:15.355493 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } I0407 02:00:15.355553 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.privatecalico.example.com" } subnet:subnet-1 ok iam-role:masters.privatecalico.example.com ok I0407 02:00:15.355580 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatecalico.example.com" } I0407 02:00:15.355622 6053 iamrole.go:180] ListAttachedRolePolicies: bastions.privatecalico.example.com I0407 02:00:15.355636 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatecalico.example.com", RoleName: "bastions.privatecalico.example.com" } I0407 02:00:15.355665 6053 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatecalico.example.com" } iam-role:bastions.privatecalico.example.com ok I0407 02:00:15.355638 6053 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0407 02:00:15.355751 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0407 02:00:15.355861 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0407 02:00:15.355919 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:15.356003 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:15.356082 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateCalico (3.52s) === RUN TestLifecyclePrivateKopeio I0407 02:00:15.356609 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:15.356752 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:15.356796 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:15.356841 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:15.356878 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:15.356928 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:15.356966 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:15.356996 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:15.357034 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:15.357061 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster privatekopeio.example.com I0407 02:00:15.385582 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:15.389094 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.389175 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:15.389232 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.706694 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:16.891241 6053 iamrole.go:89] ListRoles: { } I0407 02:00:16.893269 6053 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0407 02:00:16.893856 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.893871 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } I0407 02:00:16.894047 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:16.894061 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.894056 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "masters.privatekopeio.example.com" }] } I0407 02:00:16.894201 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:16.894227 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } I0407 02:00:16.894271 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.894329 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", Tags: [{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0407 02:00:16.894446 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.894540 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:16.894574 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:16.894615 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:16.894654 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:16.894697 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.894769 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } I0407 02:00:16.894887 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "bastions.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] } I0407 02:00:16.894876 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:16.895020 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:16.895096 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] }] } I0407 02:00:16.895272 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.privatekopeio.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:16.895404 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:16.895457 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:16.895614 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.896667 6053 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0407 02:00:16.896897 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0407 02:00:16.896844 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0407 02:00:16.896989 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0407 02:00:16.897120 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0407 02:00:16.897017 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.897169 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0407 02:00:16.897132 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0407 02:00:16.897254 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0407 02:00:16.897234 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0407 02:00:16.897483 6053 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0407 02:00:16.897413 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-privatekopeio-exa-d8ef8e", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-privatekopeio-exa-d8ef8e" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0407 02:00:16.897442 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0407 02:00:16.897541 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0407 02:00:16.897590 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:16.897590 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0407 02:00:16.897674 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.897794 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0407 02:00:16.897836 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:16.897984 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:16.897984 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0407 02:00:16.898088 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:16.898141 6053 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] } I0407 02:00:16.898227 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0407 02:00:16.898351 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] }] } I0407 02:00:16.898482 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:16.898579 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.898680 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.898776 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.898861 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0407 02:00:16.898870 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0407 02:00:16.898976 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:16.898988 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" } ] }], VpcId: "vpc-1" } I0407 02:00:16.899057 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.899148 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0407 02:00:16.899254 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:16.899277 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.8.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:16.899345 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" } ] } I0407 02:00:16.899428 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:16.899465 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:16.899551 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0407 02:00:16.899607 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:16.899503 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:16.899351 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/privatekopeio.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/privatekopeio.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"privatekopeio.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0407 02:00:16.899647 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.899719 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:16.899784 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:16.899740 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0407 02:00:16.899834 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:16.899886 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0407 02:00:16.899929 6053 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "Name", Value: "private-us-test-1b.privatekopeio.example.com" }, { Key: "KubernetesCluster", Value: "privatekopeio.example.com" }, { Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0407 02:00:16.900023 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:16.900067 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:16.900108 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:16.900161 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "bastion.privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0407 02:00:16.900242 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:16.900288 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:16.900363 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:16.900439 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:16.900512 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:16.900570 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:16.900617 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0407 02:00:16.900658 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:16.900700 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.privatekopeio.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }], VpcId: "vpc-1" } I0407 02:00:16.900784 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:16.900828 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:16.900884 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:16.900992 6053 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0407 02:00:16.901104 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:16.901193 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-1to2379-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } W0407 02:00:16.901413 6053 api.go:53] PageSize not implemented I0407 02:00:16.901399 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:16.901641 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:16.901696 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:16.901835 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:16.901555 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.901802 6053 tags.go:74] AddTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"], Tags: [{ Key: "Name", Value: "api.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] } I0407 02:00:16.901925 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:16.901898 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0407 02:00:16.901986 6053 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0407 02:00:16.902002 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-privatekopeio-exa-d8ef8e", SubnetMappings: [{ SubnetId: "subnet-2" },{ SubnetId: "subnet-3" }], Tags: [{ Key: "Name", Value: "bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }], Type: "network" } I0407 02:00:16.902080 6053 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0407 02:00:16.902151 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:16.902220 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:16.902321 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:16.902293 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1", Port: 22, Protocol: "TCP" } W0407 02:00:16.902422 6053 api.go:53] PageSize not implemented I0407 02:00:16.902411 6053 tags.go:42] CreateTags { Resources: ["nat-b2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0407 02:00:16.902457 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:16.902485 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:16.902576 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:16.902699 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0407 02:00:16.902827 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:16.902961 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.903104 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.903263 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:16.903335 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.903491 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0407 02:00:16.903540 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:16.903601 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0407 02:00:16.903699 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-masters.privatekopeio.example.com" }] }] } I0407 02:00:16.903841 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0407 02:00:16.903898 6053 tags.go:42] CreateTags { Resources: ["subnet-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0407 02:00:16.903936 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.904069 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.8.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.904198 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0407 02:00:16.904237 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" }] }] } I0407 02:00:16.904376 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-4003to65535-masters.privatekopeio.example.com" }] }] } I0407 02:00:16.904510 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.904632 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.904750 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-tcp-2382to4000-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" }] }] } I0407 02:00:16.904869 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:16.904910 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.905066 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }] } I0407 02:00:16.905179 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:16.905222 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.905352 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.905483 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0407 02:00:16.905577 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.905627 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-ingress-tcp-22to22-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.905766 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0407 02:00:16.905805 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.905926 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:16.906017 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-4" } I0407 02:00:16.906057 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0407 02:00:16.906093 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.privatekopeio.example.com-ingress-all-0to0-nodes.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.906219 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:16.906308 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0407 02:00:16.906347 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.privatekopeio.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.906465 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.privatekopeio.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.906581 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.privatekopeio.example.com-ingress-udp-1to65535-masters.privatekopeio.example.com" },{ Key: "KubernetesCluster", Value: "privatekopeio.example.com" },{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "owned" }] }] } I0407 02:00:16.906706 6053 tags.go:42] CreateTags { Resources: ["nat-a2345678"], Tags: [{ Key: "kubernetes.io/cluster/privatekopeio.example.com", Value: "shared" }] } I0407 02:00:16.906754 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:16.906811 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0407 02:00:16.906854 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0407 02:00:16.906890 6053 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-b2345678" }] } I0407 02:00:16.906939 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:16.906989 6053 tags.go:42] CreateTags { Resources: ["subnet-2"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0407 02:00:16.907026 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:16.907065 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-a2345678" }] } I0407 02:00:16.907150 6053 executor.go:111] Tasks: 122 done / 144 total; 7 can run I0407 02:00:16.907241 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0407 02:00:16.907275 6053 api.go:53] PageSize not implemented I0407 02:00:16.907330 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:16.907303 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0407 02:00:16.907434 6053 api.go:53] PageSize not implemented I0407 02:00:16.907352 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:16.907500 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:16.907475 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-a2345678", RouteTableId: "rtb-1" } I0407 02:00:16.907554 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:16.907630 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:16.907777 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-b2345678", RouteTableId: "rtb-3" } I0407 02:00:16.907712 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:16.914846 6053 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0407 02:00:16.915533 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.916088 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.916359 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.916499 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.917606 6053 executor.go:111] Tasks: 136 done / 144 total; 2 can run I0407 02:00:16.917863 6053 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0407 02:00:16.918127 6053 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0407 02:00:16.918176 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:16.918213 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:16.918278 6053 dns.go:235] Pre-creating DNS records I0407 02:00:16.918304 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:16.924718 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:16.928789 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.928908 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:16.929012 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.228998 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:18.410912 6053 iamrole.go:89] ListRoles: { } I0407 02:00:18.412674 6053 executor.go:111] Tasks: 0 done / 144 total; 48 can run I0407 02:00:18.412983 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:18.413060 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.privatekopeio.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:18.413375 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.413589 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.413682 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:18.413720 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:18.413783 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:18.414021 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.414781 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.416757 6053 executor.go:111] Tasks: 48 done / 144 total; 33 can run I0407 02:00:18.416883 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.416978 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0407 02:00:18.417079 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0407 02:00:18.417022 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.417167 6053 iamrole.go:161] ListAttachedRolePolicies: masters.privatekopeio.example.com I0407 02:00:18.417163 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-privatekopeio-exa-d8ef8e"] } I0407 02:00:18.417271 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0407 02:00:18.417142 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.417302 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } I0407 02:00:18.417435 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0407 02:00:18.417517 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.417680 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:18.417726 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:18.417822 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.417961 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.418091 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:18.418164 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["bastion.privatekopeio.example.com"] } ] } I0407 02:00:18.418422 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:18.418483 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.privatekopeio.example.com"] } ] } I0407 02:00:18.418621 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.418753 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.privatekopeio.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.418864 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.privatekopeio.example.com"] } ] } I0407 02:00:18.418985 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:18.419058 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.privatekopeio.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.privatekopeio.example.com"] } ] } I0407 02:00:18.419213 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:18.419289 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:18.419339 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:18.419420 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:18.419552 6053 executor.go:111] Tasks: 81 done / 144 total; 41 can run I0407 02:00:18.419738 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:18.419821 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:18.419935 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:18.419910 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:18.419969 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } W0407 02:00:18.419899 6053 api.go:53] PageSize not implemented I0407 02:00:18.420057 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0407 02:00:18.420121 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0407 02:00:18.420090 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.420181 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4"] } I0407 02:00:18.420154 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:18.420236 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } I0407 02:00:18.420193 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.420355 6053 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } I0407 02:00:18.420375 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0407 02:00:18.420528 6053 api.go:53] PageSize not implemented I0407 02:00:18.420559 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.420657 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:18.420975 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0407 02:00:18.421130 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:18.421246 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0407 02:00:18.421401 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.421520 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.421676 6053 executor.go:111] Tasks: 122 done / 144 total; 7 can run W0407 02:00:18.421784 6053 api.go:53] PageSize not implemented I0407 02:00:18.421813 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:18.421852 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.421880 6053 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0407 02:00:18.421843 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:18.421914 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:18.421977 6053 dnsname.go:118] AliasTarget for "api.privatekopeio.example.com" is "api-privatekopeio-example-tl2bv8.elb.cloudmock.com" I0407 02:00:18.421916 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.421982 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0407 02:00:18.422056 6053 api.go:53] PageSize not implemented I0407 02:00:18.422100 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.422177 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.432227 6053 executor.go:111] Tasks: 129 done / 144 total; 7 can run I0407 02:00:18.432486 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.432662 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.432738 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.432920 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.433657 6053 executor.go:111] Tasks: 136 done / 144 total; 2 can run W0407 02:00:18.433816 6053 api.go:53] PageSize not implemented I0407 02:00:18.433872 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.434238 6053 executor.go:111] Tasks: 138 done / 144 total; 6 can run I0407 02:00:18.434650 6053 executor.go:111] Tasks: 144 done / 144 total; 0 can run I0407 02:00:18.438445 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:18.438519 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:18.438560 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:18.438593 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:18.438630 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:18.438663 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:18.438700 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:18.438734 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:18.438770 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:18.438807 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:18.438845 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0407 02:00:18.438884 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:18.438918 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:18.438951 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:18.438987 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:18.439019 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:18.439054 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0407 02:00:18.439093 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:18.439128 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:18.439165 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:18.439199 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:18.439233 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:18.439271 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:18.439302 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:18.439337 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:18.439374 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:18.439409 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:18.439440 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:18.439471 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:18.439508 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:18.439544 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:18.439579 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:18.441184 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:18.441258 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:18.441281 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:18.441325 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441385 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0407 02:00:18.441455 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441521 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441572 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441624 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441667 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441735 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } I0407 02:00:18.441809 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441876 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:18.441913 6053 natgateway.go:117] DescribeNatGateways: { } I0407 02:00:18.441952 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["privatekopeio.example.com"] }] } I0407 02:00:18.441991 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/privatekopeio.example.com"] }] } W0407 02:00:18.442047 6053 api.go:53] PageSize not implemented I0407 02:00:18.442065 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-privatekopeio-example-tl2bv8"] } I0407 02:00:18.442108 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:18.442135 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:18.442152 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1"] } I0407 02:00:18.442192 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:18.442219 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:18.442238 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" ] } I0407 02:00:18.442294 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:18.442343 6053 iamrole.go:89] ListRoles: { } I0407 02:00:18.442394 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:18.442422 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:18.442468 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:18.442518 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:18.442570 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3","rtb-1","rtb-2"] } I0407 02:00:18.442614 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-a2345678"] } I0407 02:00:18.442647 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-b2345678"] } I0407 02:00:18.443291 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:bastion.privatekopeio.example.com ok I0407 02:00:18.443362 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-privatekopeio-exa-d8ef8e/1 ok I0407 02:00:18.443384 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0407 02:00:18.443424 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:18.443505 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.privatekopeio.example.com" } iam-instance-profile:bastions.privatekopeio.example.com ok I0407 02:00:18.443489 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4" } autoscaling-group:master-us-test-1a.masters.privatekopeio.example.com ok autoscaling-group:nodes.privatekopeio.example.com ok I0407 02:00:18.443578 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-config:lt-3 ok target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-privatekopeio-exa-d8ef8e/4 ok I0407 02:00:18.443610 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0407 02:00:18.443688 6053 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-privatekopeio-example-tl2bv8" } load-balancer:api-privatekopeio-example-tl2bv8 ok I0407 02:00:18.443509 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.privatekopeio.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-privatekopeio-example-tl2bv8.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.privatekopeio.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.privatekopeio.example.com. ok I0407 02:00:18.443713 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.privatekopeio.example.com" } iam-instance-profile:nodes.privatekopeio.example.com ok I0407 02:00:18.443802 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0407 02:00:18.443857 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.privatekopeio.example.com" } iam-instance-profile:masters.privatekopeio.example.com ok I0407 02:00:18.443666 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-4" }] } ] } W0407 02:00:18.443899 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:18.443925 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0407 02:00:18.443982 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:18.444054 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok autoscaling-config:lt-1 ok I0407 02:00:18.444097 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:18.444158 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:18.444204 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.8.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 } ] } W0407 02:00:18.444370 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:18.444390 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0407 02:00:18.444421 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:18.444469 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0407 02:00:18.444582 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:18.444595 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0407 02:00:18.444703 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:18.444765 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.privatekopeio.example.com" } I0407 02:00:18.444811 6053 iamrole.go:180] ListAttachedRolePolicies: bastions.privatekopeio.example.com I0407 02:00:18.444787 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0407 02:00:18.444829 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.privatekopeio.example.com", RoleName: "bastions.privatekopeio.example.com" } I0407 02:00:18.444879 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:18.444935 6053 iamrole.go:137] DeleteRole: { RoleName: "bastions.privatekopeio.example.com" } iam-role:bastions.privatekopeio.example.com ok I0407 02:00:18.444992 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.privatekopeio.example.com" } I0407 02:00:18.444940 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } W0407 02:00:18.445087 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:18.445108 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:18.445044 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.privatekopeio.example.com I0407 02:00:18.445161 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.privatekopeio.example.com", RoleName: "nodes.privatekopeio.example.com" } I0407 02:00:18.445200 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.privatekopeio.example.com" } iam-role:nodes.privatekopeio.example.com ok I0407 02:00:18.445157 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0407 02:00:18.445265 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0407 02:00:18.445254 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.privatekopeio.example.com" } I0407 02:00:18.445347 6053 iamrole.go:180] ListAttachedRolePolicies: masters.privatekopeio.example.com I0407 02:00:18.445380 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.privatekopeio.example.com", RoleName: "masters.privatekopeio.example.com" } I0407 02:00:18.445438 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.privatekopeio.example.com" } iam-role:masters.privatekopeio.example.com ok I0407 02:00:18.445561 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0407 02:00:18.445651 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0407 02:00:18.445743 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:18.445856 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:18.445965 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecyclePrivateKopeio (3.09s) === RUN TestLifecycleIPv6 I0407 02:00:18.446531 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:18.446695 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:18.446746 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:18.446818 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:18.446877 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:18.446957 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:18.447011 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:18.447069 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:18.447133 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:18.447179 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal-ipv6.example.com I0407 02:00:18.475661 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 02:00:18.479478 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:18.479586 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:19.793027 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:19.963797 6053 iamrole.go:89] ListRoles: { } I0407 02:00:19.965355 6053 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0407 02:00:19.968804 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } I0407 02:00:19.968920 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] } I0407 02:00:19.969198 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] }] } I0407 02:00:19.969652 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:19.969819 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } I0407 02:00:19.969650 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:19.970186 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:19.970006 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" }] } I0407 02:00:19.970283 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.971190 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.971334 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:19.971462 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.972329 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.972336 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.972567 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:19.972763 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:19.972824 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:19.972991 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0407 02:00:19.973178 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:19.973220 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:19.973250 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:19.973294 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:19.974388 6053 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0407 02:00:19.974639 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0407 02:00:19.974707 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0407 02:00:19.974580 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0407 02:00:19.974776 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.974868 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0407 02:00:19.974898 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.974944 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0407 02:00:19.975034 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0407 02:00:19.975091 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0407 02:00:19.975223 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:19.975199 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-minimal-ipv6-example--bne5ih", Port: 443, Protocol: "TCP", Tags: [{ Key: "Name", Value: "tcp-minimal-ipv6-example--bne5ih" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0407 02:00:19.975236 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0407 02:00:19.975354 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0407 02:00:19.975435 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0407 02:00:19.975499 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.975692 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1b"] }] } I0407 02:00:19.975842 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] }], VpcId: "vpc-1" } I0407 02:00:19.975885 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.976022 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:19.976101 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0407 02:00:19.976155 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0407 02:00:19.976243 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0407 02:00:19.976290 6053 tags.go:42] CreateTags { Resources: ["rtb-3"], Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal-ipv6.example.com" } ] } I0407 02:00:19.976379 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.minimal-ipv6.example.com" }] }], VpcId: "vpc-1" } I0407 02:00:19.976470 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:19.976517 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:19.976559 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:19.976564 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal-ipv6.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal-ipv6.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:AssignIpv6Addresses\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal-ipv6.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0407 02:00:19.976749 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.976999 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.977090 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:19.977175 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:19.977258 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:19.977338 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal-ipv6.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:19.977418 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:19.977464 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:19.977508 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:19.977555 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0407 02:00:19.977635 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:19.977738 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:19.977788 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:19.977846 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:19.977893 6053 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Name", Value: "private-us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1b" } ] } I0407 02:00:19.977982 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:19.978070 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:19.978179 6053 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0407 02:00:19.978286 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.978412 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] }] } I0407 02:00:19.978501 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", Ipv6CidrBlock: "2001:db8:0:113::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "dualstack-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:19.978573 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:19.978674 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:19.978689 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", Ipv6CidrBlock: "2001:db8:0:111::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:19.978847 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:19.978928 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:19.979069 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0407 02:00:19.979267 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 02:00:19.979489 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.979671 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.64.0/19", Ipv6CidrBlock: "2001:db8:0:114::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "DualStack" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "dualstack-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:19.979816 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:19.979895 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.980017 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.980158 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.980231 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:19.980284 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", CidrBlock: "172.20.4.0/22", Ipv6CidrBlock: "2001:db8:0:116::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "utility-us-test-1b.minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:19.980395 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.980531 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] }] } I0407 02:00:19.980534 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.0.0/22", Ipv6CidrBlock: "2001:db8:0:115::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }, { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:19.980616 6053 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.980733 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-udp-1to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.980944 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.980923 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1b", Ipv6CidrBlock: "2001:db8:0:112::/64", Ipv6Native: true, TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" }, { Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:19.981060 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-3" } I0407 02:00:19.981139 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.981231 6053 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.981355 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-::/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" }] }] } I0407 02:00:19.981537 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.981740 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.981908 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:19.981978 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0407 02:00:19.982102 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.982260 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-1" } I0407 02:00:19.982328 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-4003to65535-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0407 02:00:19.982520 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", EgressOnlyInternetGatewayId: "eigw-2", RouteTableId: "rtb-2" } I0407 02:00:19.982564 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.982741 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-::/0-ingress-tcp-22to22-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.982927 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:19.983046 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }] } I0407 02:00:19.983150 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-2382to4000-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.983320 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-ingress-tcp-1to2379-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.983519 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal-ipv6.example.com" }] }] } I0407 02:00:19.983675 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.983837 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal-ipv6.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.983995 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-nodes.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.984156 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal-ipv6.example.com-ingress-all-0to0-masters.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" }] }] } I0407 02:00:19.984349 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:19.984425 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:19.984490 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0407 02:00:19.984550 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0407 02:00:19.984608 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0407 02:00:19.984686 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0407 02:00:19.984745 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:19.984807 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0407 02:00:19.984889 6053 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0407 02:00:19.985017 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.985031 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:19.985177 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:19.985228 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-6"] }] } I0407 02:00:19.985278 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-6" } I0407 02:00:19.985318 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.985300 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "dualstack", Name: "api-minimal-ipv6-example--jhj9te", SubnetMappings: [{ SubnetId: "subnet-5" },{ SubnetId: "subnet-4" }], Tags: [{ Key: "Name", Value: "api.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }], Type: "network" } I0407 02:00:19.985420 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0407 02:00:19.985476 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0407 02:00:19.985563 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:19.985623 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:19.985531 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1", Port: 443, Protocol: "TCP" } I0407 02:00:19.985663 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:19.985735 6053 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "false" },{ Key: "access_logs.s3.enabled", Value: "false" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } W0407 02:00:19.985813 6053 api.go:53] PageSize not implemented I0407 02:00:19.985804 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-5"] }] } I0407 02:00:19.985848 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-5" } I0407 02:00:19.985884 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.986010 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0407 02:00:19.986052 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-2" } I0407 02:00:19.986088 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.986169 6053 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:19.986246 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.986287 6053 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-2", SubnetId: "subnet-4", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1b.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.986382 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:19.986431 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:19.986477 6053 tags.go:42] CreateTags { Resources: ["subnet-4"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0407 02:00:19.986529 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0407 02:00:19.986574 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-3" } I0407 02:00:19.986611 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.986687 6053 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-5"] }] } I0407 02:00:19.986798 6053 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-1", SubnetId: "subnet-5", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.minimal-ipv6.example.com" },{ Key: "KubernetesCluster", Value: "minimal-ipv6.example.com" },{ Key: "kubernetes.io/cluster/minimal-ipv6.example.com", Value: "owned" }] }] } I0407 02:00:19.986785 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:19.986944 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-4"] }] } I0407 02:00:19.986988 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-3", SubnetId: "subnet-4" } I0407 02:00:19.987042 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0407 02:00:19.987086 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0407 02:00:19.987130 6053 tags.go:42] CreateTags { Resources: ["subnet-5"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-2" }] } I0407 02:00:19.987204 6053 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0407 02:00:19.987282 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.987287 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0407 02:00:19.987355 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0407 02:00:19.987402 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:19.987408 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0407 02:00:19.987439 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:19.987462 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.987509 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:19.987692 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:19.987726 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "64:ff9b::/96", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0407 02:00:19.987715 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:19.987839 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:19.987816 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:19.987876 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:19.987951 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0407 02:00:19.987843 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:19.988006 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:19.988126 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-2", RouteTableId: "rtb-1" } I0407 02:00:19.993444 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:19.993678 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:19.993857 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:19.994032 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:19.994178 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:19.994725 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:19.995023 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:19.995339 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:19.995396 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:19.995437 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:19.995511 6053 dns.go:235] Pre-creating DNS records I0407 02:00:19.995539 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:20.002291 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.25.13 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.13 ********************************************************************************* I0407 02:00:20.006069 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:20.006161 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.313331 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:21.496661 6053 iamrole.go:89] ListRoles: { } I0407 02:00:21.498703 6053 executor.go:111] Tasks: 0 done / 136 total; 46 can run I0407 02:00:21.499108 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal-ipv6.example.com"] }] } I0407 02:00:21.499278 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.499373 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:21.499400 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:21.499446 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:21.499379 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:21.499475 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.499581 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.500261 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal-ipv6.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:21.501532 6053 executor.go:111] Tasks: 46 done / 136 total; 25 can run I0407 02:00:21.501685 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0407 02:00:21.501689 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.501932 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0407 02:00:21.501891 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:21.502021 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:21.502042 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-minimal-ipv6-example--bne5ih"] } I0407 02:00:21.502116 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0407 02:00:21.502155 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } I0407 02:00:21.502121 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.502262 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal-ipv6.example.com"] } ] } I0407 02:00:21.502424 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:21.502490 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.502616 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.502735 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.502854 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal-ipv6.example.com"] } ] } I0407 02:00:21.503012 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:21.503120 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.minimal-ipv6.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.minimal-ipv6.example.com"] } ] } I0407 02:00:21.503253 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:21.503431 6053 executor.go:111] Tasks: 71 done / 136 total; 36 can run I0407 02:00:21.503581 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.503696 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.503837 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.504013 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["dualstack-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.504168 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:21.504247 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.504381 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-6"] } I0407 02:00:21.504443 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1b.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.504648 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-4"] } I0407 02:00:21.504749 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.504840 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:21.504883 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } I0407 02:00:21.504992 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-5"] } I0407 02:00:21.505259 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:21.505401 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:21.505496 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal-ipv6.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.505641 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:21.505838 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.505995 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.506082 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0407 02:00:21.506120 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0407 02:00:21.506158 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0407 02:00:21.506208 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:21.506261 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0407 02:00:21.506440 6053 executor.go:111] Tasks: 107 done / 136 total; 9 can run I0407 02:00:21.506588 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:21.506675 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:21.506630 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } I0407 02:00:21.506706 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.506765 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.506831 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0407 02:00:21.506752 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.506879 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4"] } I0407 02:00:21.506922 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0407 02:00:21.506944 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-3"] } W0407 02:00:21.507048 6053 api.go:53] PageSize not implemented I0407 02:00:21.507052 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.507131 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:21.507195 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.507281 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.507350 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0407 02:00:21.507407 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.507490 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.507590 6053 executor.go:111] Tasks: 116 done / 136 total; 8 can run I0407 02:00:21.507663 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.507661 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0407 02:00:21.507754 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:21.507817 6053 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" W0407 02:00:21.507778 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:21.507860 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:21.507745 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:21.507894 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.507897 6053 dnsname.go:118] AliasTarget for "api.minimal-ipv6.example.com" is "api-minimal-ipv6-example--jhj9te.amazonaws.com" I0407 02:00:21.508012 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:21.507973 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.508054 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.508082 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:21.508183 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:21.508241 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:21.508267 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.508366 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:21.508420 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.513508 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:21.513622 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.513769 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.513855 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.514013 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.514515 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:21.514862 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:21.515090 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:21.518510 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:21.518576 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:21.518619 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:21.518656 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-2"] }] } I0407 02:00:21.518692 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0407 02:00:21.518728 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:21.518760 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-2"] }] } I0407 02:00:21.518796 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:21.518832 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:21.518867 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:21.518900 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:21.518936 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:21.518976 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:21.519017 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:21.519056 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-2"] }] } I0407 02:00:21.519092 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:21.519125 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:21.519156 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:21.519191 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:21.519227 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:21.519263 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-3"] }] } I0407 02:00:21.519302 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:21.519340 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:21.519376 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:21.519410 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:21.519445 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:21.519478 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:21.519513 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:21.519549 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-4"] }] } I0407 02:00:21.519586 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-5"] }] } I0407 02:00:21.519621 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-6"] }] } I0407 02:00:21.519661 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:21.519694 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:21.519728 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:21.519765 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:21.519802 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:21.519839 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:21.521868 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:21.521940 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:21.521963 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:21.522011 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522070 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0407 02:00:21.522133 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522196 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522250 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522306 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522359 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522409 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } I0407 02:00:21.522478 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522558 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:21.522593 6053 natgateway.go:117] DescribeNatGateways: { } I0407 02:00:21.522639 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal-ipv6.example.com"] }] } I0407 02:00:21.522679 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal-ipv6.example.com"] }] } W0407 02:00:21.522736 6053 api.go:53] PageSize not implemented I0407 02:00:21.522756 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:21.522787 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:21.522803 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1"] } I0407 02:00:21.522843 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:21.522871 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:21.522890 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" ] } I0407 02:00:21.522948 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:21.522991 6053 iamrole.go:89] ListRoles: { } I0407 02:00:21.523040 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:21.523071 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:21.523119 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:21.523168 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:21.523223 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2","rtb-1","rtb-3"] } I0407 02:00:21.523269 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-2"] } I0407 02:00:21.523309 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-1"] } I0407 02:00:21.523345 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:21.523377 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-2"] } autoscaling-group:master-us-test-1a.masters.minimal-ipv6.example.com ok I0407 02:00:21.524051 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0407 02:00:21.524115 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal-ipv6.example.com" } iam-instance-profile:masters.minimal-ipv6.example.com ok I0407 02:00:21.524088 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:21.524152 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0407 02:00:21.524201 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal-ipv6.example.com" } iam-instance-profile:nodes.minimal-ipv6.example.com ok I0407 02:00:21.524193 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1" } I0407 02:00:21.524179 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-minimal-ipv6-example--jhj9te/1 ok autoscaling-group:nodes.minimal-ipv6.example.com ok I0407 02:00:21.524277 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-minimal-ipv6-example--bne5ih/4 ok I0407 02:00:21.524137 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-minimal-ipv6-example--jhj9te.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.minimal-ipv6.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal-ipv6.example.com.", ResourceRecords: [{ Value: "fd00:dead:add::" }], TTL: 10, Type: "AAAA" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal-ipv6.example.com ok I0407 02:00:21.524272 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0407 02:00:21.524424 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:21.524448 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok autoscaling-config:lt-1 ok I0407 02:00:21.524519 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:21.524595 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0407 02:00:21.524638 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:21.524695 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok autoscaling-config:lt-2 ok I0407 02:00:21.524792 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-5" } subnet:subnet-5 ok I0407 02:00:21.524883 6053 egressonlyinternetgateways.go:171] DeleteEgressOnlyInternetGateway: { EgressOnlyInternetGatewayId: "eigw-2" } egress-only-internet-gateway:eigw-2 ok I0407 02:00:21.524958 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:21.525018 6053 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-2" } nat-gateway:nat-2 ok I0407 02:00:21.525090 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:21.525146 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: -1, IpProtocol: "icmpv6", Ipv6Ranges: [{ CidrIpv6: "::/0" }], ToPort: -1 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0407 02:00:21.525439 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:21.525461 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:21.525504 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:21.525563 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-4" } subnet:subnet-4 ok I0407 02:00:21.525619 6053 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } nat-gateway:nat-1 ok I0407 02:00:21.525670 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0407 02:00:21.525788 6053 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-2" } elastic-ip:eipalloc-2 ok I0407 02:00:21.525846 6053 address.go:185] ReleaseAddress: { AllocationId: "eipalloc-1" } elastic-ip:eipalloc-1 ok I0407 02:00:21.525839 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal-ipv6.example.com" } I0407 02:00:21.525913 6053 iamrole.go:180] ListAttachedRolePolicies: masters.minimal-ipv6.example.com I0407 02:00:21.525934 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal-ipv6.example.com", RoleName: "masters.minimal-ipv6.example.com" } I0407 02:00:21.525913 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0407 02:00:21.525973 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal-ipv6.example.com" } iam-role:masters.minimal-ipv6.example.com ok I0407 02:00:21.526003 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal-ipv6.example.com" } I0407 02:00:21.526046 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal-ipv6.example.com I0407 02:00:21.526023 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-6" } subnet:subnet-6 ok I0407 02:00:21.526060 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal-ipv6.example.com", RoleName: "nodes.minimal-ipv6.example.com" } I0407 02:00:21.526087 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal-ipv6.example.com" } iam-role:nodes.minimal-ipv6.example.com ok I0407 02:00:21.526086 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:21.526138 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-3" } route-table:rtb-3 ok I0407 02:00:21.526226 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0407 02:00:21.526279 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:21.526354 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:21.526429 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleIPv6 (3.08s) === RUN TestLifecycleSharedVPC I0407 02:00:21.526926 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:21.527073 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:21.527114 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:21.527155 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:21.527194 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:21.527242 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:21.527283 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:21.527317 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:21.527359 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:21.527387 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedvpc.example.com I0407 02:00:21.556615 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:21.560173 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:21.560270 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:22.874036 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:23.050233 6053 iamrole.go:89] ListRoles: { } I0407 02:00:23.051613 6053 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0407 02:00:23.052443 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } I0407 02:00:23.052512 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0407 02:00:23.054006 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:23.054452 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:23.055793 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:23.056304 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } I0407 02:00:23.054921 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:23.056522 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] } I0407 02:00:23.056722 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:23.056830 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.057285 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:23.057651 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:23.057867 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:23.058651 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:23.058727 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:23.058873 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:23.061159 6053 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0407 02:00:23.061314 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:23.061429 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:23.061543 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0407 02:00:23.061607 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0407 02:00:23.061594 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:23.061622 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" } ] }], VpcId: "vpc-12345678" } I0407 02:00:23.061800 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0407 02:00:23.061797 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:23.061887 6053 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0407 02:00:23.061869 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" } ] } I0407 02:00:23.061878 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.sharedvpc.example.com" }, { Key: "KubernetesCluster", Value: "sharedvpc.example.com" }, { Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0407 02:00:23.061961 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0407 02:00:23.062162 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:23.062267 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:23.062323 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:23.062337 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0407 02:00:23.062370 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:23.062483 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0407 02:00:23.062663 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedvpc.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:23.062766 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:23.062811 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:23.062860 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:23.062905 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:23.063890 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedvpc.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedvpc.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedvpc.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0407 02:00:23.067183 6053 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0407 02:00:23.067427 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0407 02:00:23.067614 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0407 02:00:23.067822 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:23.067982 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0407 02:00:23.068131 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.068364 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.068620 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" }] }] } I0407 02:00:23.068779 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:23.068855 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-masters.sharedvpc.example.com" }] }] } I0407 02:00:23.068984 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:23.069059 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-1to2379-masters.sharedvpc.example.com" }] }] } I0407 02:00:23.069230 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.069366 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0407 02:00:23.069528 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.069663 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:23.069768 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:23.069869 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-4003to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.070069 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0407 02:00:23.070124 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedvpc.example.com-ingress-all-0to0-nodes.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" }] }] } I0407 02:00:23.070264 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:23.070369 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:23.070518 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-tcp-2382to4000-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.070743 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedvpc.example.com-ingress-udp-1to65535-masters.sharedvpc.example.com" },{ Key: "KubernetesCluster", Value: "sharedvpc.example.com" },{ Key: "kubernetes.io/cluster/sharedvpc.example.com", Value: "owned" }] }] } I0407 02:00:23.070896 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:23.070946 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:23.071054 6053 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0407 02:00:23.071369 6053 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0407 02:00:23.071685 6053 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0407 02:00:23.071758 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:23.071815 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:23.071883 6053 dns.go:235] Pre-creating DNS records I0407 02:00:23.071917 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:23.077707 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:23.080902 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:23.080990 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.387719 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:24.563099 6053 iamrole.go:89] ListRoles: { } I0407 02:00:24.564574 6053 executor.go:111] Tasks: 0 done / 98 total; 44 can run I0407 02:00:24.564974 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedvpc.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:24.565214 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:24.565257 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.565562 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:24.565644 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:24.565674 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:24.566973 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedvpc.example.com"] }] } I0407 02:00:24.568819 6053 executor.go:111] Tasks: 44 done / 98 total; 21 can run I0407 02:00:24.569164 6053 iamrole.go:161] ListAttachedRolePolicies: masters.sharedvpc.example.com I0407 02:00:24.569050 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedvpc.example.com"] } ] } I0407 02:00:24.569291 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0407 02:00:24.569323 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:24.569405 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.569638 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:24.569713 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:24.569838 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["sharedvpc.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.569970 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedvpc.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedvpc.example.com"] } ] } I0407 02:00:24.570157 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:24.574495 6053 executor.go:111] Tasks: 65 done / 98 total; 25 can run I0407 02:00:24.574752 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.574887 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.575011 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:24.575203 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.575539 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:24.575657 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.575796 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:24.576336 6053 executor.go:111] Tasks: 90 done / 98 total; 2 can run I0407 02:00:24.576615 6053 executor.go:111] Tasks: 92 done / 98 total; 6 can run I0407 02:00:24.576865 6053 executor.go:111] Tasks: 98 done / 98 total; 0 can run I0407 02:00:24.579384 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:24.579447 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:24.579482 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:24.579514 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:24.579546 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:24.579580 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:24.579616 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:24.579654 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:24.579695 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:24.579725 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:24.579757 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:24.579789 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:24.579820 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:24.579853 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:24.579885 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:24.579920 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:24.579949 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:24.579981 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:24.580013 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:24.580047 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:24.580082 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:24.581373 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:24.581442 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:24.581464 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:24.581507 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581559 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0407 02:00:24.581617 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581677 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581749 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581804 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581848 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581888 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } I0407 02:00:24.581938 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.581996 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedvpc.example.com"] }] } I0407 02:00:24.582032 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedvpc.example.com"] }] } W0407 02:00:24.582084 6053 api.go:53] PageSize not implemented I0407 02:00:24.582107 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:24.582134 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:24.582154 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:24.582180 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:24.582199 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:24.582249 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:24.582285 6053 iamrole.go:89] ListRoles: { } I0407 02:00:24.582330 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:24.582359 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:24.582407 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:24.582449 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:24.582482 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:nodes.sharedvpc.example.com ok autoscaling-config:lt-1 ok I0407 02:00:24.582908 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:24.583001 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:master-us-test-1a.masters.sharedvpc.example.com ok I0407 02:00:24.583017 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0407 02:00:24.583104 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedvpc.example.com" } iam-instance-profile:masters.sharedvpc.example.com ok I0407 02:00:24.582933 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedvpc.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:24.583150 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } route53-record:Z1AFAKE1ZON3YO/A/api.sharedvpc.example.com. ok I0407 02:00:24.583068 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } I0407 02:00:24.583195 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedvpc.example.com" } W0407 02:00:24.583209 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions iam-instance-profile:nodes.sharedvpc.example.com ok I0407 02:00:24.583236 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok autoscaling-config:lt-2 ok I0407 02:00:24.583284 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:24.583336 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0407 02:00:24.583532 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:24.583552 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:24.583595 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:24.583658 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:24.583754 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedvpc.example.com" } I0407 02:00:24.583804 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedvpc.example.com I0407 02:00:24.583782 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:24.583821 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedvpc.example.com", RoleName: "nodes.sharedvpc.example.com" } I0407 02:00:24.583884 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedvpc.example.com" } iam-role:nodes.sharedvpc.example.com ok I0407 02:00:24.583924 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedvpc.example.com" } I0407 02:00:24.583971 6053 iamrole.go:180] ListAttachedRolePolicies: masters.sharedvpc.example.com I0407 02:00:24.583987 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedvpc.example.com", RoleName: "masters.sharedvpc.example.com" } I0407 02:00:24.584017 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedvpc.example.com" } iam-role:masters.sharedvpc.example.com ok I0407 02:00:24.584088 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecycleSharedVPC (3.06s) === RUN TestLifecycleComplex I0407 02:00:24.584577 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:24.584717 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:24.584755 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:24.584799 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:24.584840 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:24.584891 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:24.584931 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:24.584962 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:24.585003 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:24.585031 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster complex.example.com I0407 02:00:24.623505 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:24.628346 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:24.628499 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:25.942946 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:26.127448 6053 iamrole.go:89] ListRoles: { } I0407 02:00:26.132557 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run W0407 02:00:26.132957 6053 api.go:53] PageSize not implemented I0407 02:00:26.132952 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:26.133180 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:26.133385 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:26.133492 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:26.133665 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:26.133740 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } I0407 02:00:26.133741 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.133889 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", Tags: [ { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] } I0407 02:00:26.134023 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.134163 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } I0407 02:00:26.134194 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.134285 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.complex.example.com", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] } I0407 02:00:26.134305 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.134315 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0407 02:00:26.134566 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:26.134663 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/main", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-main.complex.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:26.134864 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:26.134941 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:26.134980 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:26.135018 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.135248 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "k8s.io/etcd/events", Value: "a/a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Name", Value: "a.etcd-events.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "Owner", Value: "John Doe" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:26.135395 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:26.135448 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:26.135492 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:26.136350 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 02:00:26.136488 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:26.136621 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:26.136655 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:26.136702 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0407 02:00:26.136787 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:26.136781 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:26.136773 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.136846 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0407 02:00:26.136899 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:26.136958 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tcp-complex-example-com-vpjolq", Port: 443, Protocol: "TCP", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "tcp-complex-example-com-vpjolq" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0407 02:00:26.136982 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0407 02:00:26.136932 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:26.137103 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:26.137167 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "tls-complex-example-com-5nursn", Port: 443, Protocol: "TLS", Tags: [ { Key: "Name", Value: "tls-complex-example-com-5nursn" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], UnhealthyThresholdCount: 2, VpcId: "vpc-1" } I0407 02:00:26.137199 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }], VpcId: "vpc-1" } I0407 02:00:26.137270 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:26.137323 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:26.137315 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0407 02:00:26.137379 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:26.137436 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "Name", Value: "masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }], VpcId: "vpc-1" } I0407 02:00:26.137541 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:26.137592 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:26.137634 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:26.137834 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.complex.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "api-elb.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }], VpcId: "vpc-1" } I0407 02:00:26.137938 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.138026 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:26.138096 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:26.138171 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0407 02:00:26.138264 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:26.138218 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.96.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-utility.complex.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:26.138335 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:26.138431 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.138524 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0407 02:00:26.138637 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:26.138699 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:26.138741 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:26.138468 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/complex.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/complex.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"complex.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0407 02:00:26.138782 6053 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.2.0.0/16", VpcId: "vpc-1" } I0407 02:00:26.138825 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0407 02:00:26.138951 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] }], VpcId: "vpc-1" } I0407 02:00:26.138992 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:26.139073 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:26.139119 6053 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "10.1.0.0/16", VpcId: "vpc-1" } I0407 02:00:26.139165 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:26.139300 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:26.139277 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-1" } I0407 02:00:26.139370 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:26.139426 6053 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] } I0407 02:00:26.139528 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:26.139590 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:26.139635 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:26.139683 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:26.139726 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "private-us-test-1a.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" } ] } I0407 02:00:26.139859 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 02:00:26.139995 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:26.140170 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:26.140342 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0407 02:00:26.140309 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "10.1.64.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "Name", Value: "us-east-1a-private.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:26.140439 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.140782 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }] } I0407 02:00:26.140953 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0407 02:00:26.141114 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.141337 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0407 02:00:26.141494 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:26.141575 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:26.141756 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:26.141885 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:26.142010 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }] } I0407 02:00:26.142178 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:26.142248 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-all-0to0-nodes.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0407 02:00:26.142489 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }] } I0407 02:00:26.142630 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-2" } I0407 02:00:26.142709 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0407 02:00:26.142786 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0407 02:00:26.142847 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0407 02:00:26.142981 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }] } I0407 02:00:26.143081 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }] } I0407 02:00:26.143174 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.0/24-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0407 02:00:26.143313 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }] } I0407 02:00:26.143405 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0407 02:00:26.143502 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-udp-1to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0407 02:00:26.143649 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }] } I0407 02:00:26.143748 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-4003to65535-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.143892 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-1to2379-masters.complex.example.com" } ] }] } I0407 02:00:26.144044 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:26.144086 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-1" } I0407 02:00:26.144121 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Owner", Value: "John Doe" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-nodes.complex.example.com" } ] }] } I0407 02:00:26.144268 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0407 02:00:26.144416 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-nodes.complex.example.com-ingress-tcp-2382to4000-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.144563 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", RouteTableId: "rtb-1", TransitGatewayId: "tgw-123456" } I0407 02:00:26.144622 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-0.0.0.0/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" } ] }] } I0407 02:00:26.144770 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-ingress-all-0to0-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" } ] }] } I0407 02:00:26.144922 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }] } I0407 02:00:26.145146 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-1.1.1.1/32-ingress-tcp-22to22-masters.complex.example.com" } ] }] } I0407 02:00:26.145436 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" }, { Key: "Name", Value: "from-masters.complex.example.com-egress-all-0to0-::/0" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" } ] }] } I0407 02:00:26.145727 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "192.168.1.10/32", RouteTableId: "rtb-1", TransitGatewayId: "tgw-0123456" } I0407 02:00:26.145872 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:26.145973 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [ { Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ] }] } I0407 02:00:26.146148 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:26.146232 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 02:00:26.146307 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:26.146360 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:26.146448 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:26.146436 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-3"] }] } I0407 02:00:26.146477 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-3" } I0407 02:00:26.146565 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "api-complex-example-com-vd3t5n", SubnetMappings: [{ AllocationId: "eipalloc-012345a678b9cdefa", SubnetId: "subnet-1" }], Tags: [ { Key: "Name", Value: "api.complex.example.com" }, { Key: "KubernetesCluster", Value: "complex.example.com" }, { Key: "kubernetes.io/cluster/complex.example.com", Value: "owned" }, { Key: "Owner", Value: "John Doe" }, { Key: "foo/bar", Value: "fib+baz" } ], Type: "network" } I0407 02:00:26.146679 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:26.146737 6053 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-test-1:000000000000:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0407 02:00:26.146826 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0407 02:00:26.146905 6053 loadbalancers.go:170] ModifyLoadBalancerAttributes v2 { Attributes: [{ Key: "load_balancing.cross_zone.enabled", Value: "true" },{ Key: "access_logs.s3.enabled", Value: "true" },{ Key: "access_logs.s3.bucket", Value: "access-log-example" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:26.146979 6053 api.go:53] PageSize not implemented I0407 02:00:26.147038 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 02:00:26.147082 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:26.147130 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:26.147160 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:26.147245 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:26.147149 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:26.147503 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:26.147641 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:26.147398 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:26.147684 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:26.147769 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:26.153406 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 02:00:26.153642 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:26.153791 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:26.153990 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:26.154121 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:26.154670 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 02:00:26.154973 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 02:00:26.155289 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 02:00:26.155339 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:26.155377 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:26.155450 6053 dns.go:235] Pre-creating DNS records I0407 02:00:26.155476 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:26.163458 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:26.167586 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:26.167678 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.471344 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:27.656503 6053 iamrole.go:89] ListRoles: { } I0407 02:00:27.658659 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0407 02:00:27.658900 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:27.659226 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:27.659185 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.659381 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:27.659420 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:27.659481 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0407 02:00:27.659502 6053 api.go:53] PageSize not implemented I0407 02:00:27.659561 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] }] } I0407 02:00:27.659777 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0407 02:00:27.660034 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:27.660171 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.660313 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:27.660786 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:27.662722 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 02:00:27.662871 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:27.662843 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:27.662974 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:27.663033 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:27.663129 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:27.663116 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:27.663148 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:27.663182 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:27.663259 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:27.663332 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.663335 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:27.663512 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:27.663464 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:27.663559 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:27.663616 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:27.663669 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.663822 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:27.663865 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0407 02:00:27.663992 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:27.664032 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:27.664190 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:27.664238 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0407 02:00:27.664345 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:27.664425 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.664533 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:27.664772 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 02:00:27.665137 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:27.665281 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:27.665492 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:27.665726 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:27.665815 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:27.665999 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:27.666108 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.666270 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:27.666407 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 02:00:27.666478 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:27.666586 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:27.666681 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:27.666703 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.666756 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.666794 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:27.666833 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:27.666866 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:27.666898 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:27.666994 6053 api.go:53] PageSize not implemented I0407 02:00:27.667043 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 02:00:27.667091 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:27.667138 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:27.667133 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:27.667197 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:27.667156 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.667226 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:27.667259 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:27.667242 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:27.667328 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:27.667351 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.667491 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:27.667526 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.667643 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:27.667691 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:27.673032 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 02:00:27.673167 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.673338 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.673539 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.673700 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.674189 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 02:00:27.674501 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 02:00:27.674723 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.sslCertificate=arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678] I0407 02:00:27.681133 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:27.684614 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:27.696820 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:27.700869 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:27.700958 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.030533 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:29.206570 6053 iamrole.go:89] ListRoles: { } I0407 02:00:29.212581 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0407 02:00:29.212830 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.213374 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:29.213518 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:29.213618 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } W0407 02:00:29.213810 6053 api.go:53] PageSize not implemented I0407 02:00:29.213743 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.213986 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:29.214145 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:29.214152 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:29.214348 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:29.214434 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:29.214459 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:29.214500 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:29.216725 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 02:00:29.216870 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] }] } I0407 02:00:29.217007 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:29.217084 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:29.217116 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:29.217104 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:29.217015 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:29.217174 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:29.217253 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.217301 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:29.217386 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:29.217431 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:29.217467 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:29.217615 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:29.217722 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:29.217911 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:29.218020 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.218188 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:29.218258 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.218398 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:29.218467 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:29.218570 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:29.218665 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:29.218760 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:29.218895 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.219018 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:29.219159 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 02:00:29.219343 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:29.219568 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:29.219732 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:29.219943 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:29.220153 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:29.220318 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:29.220468 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:29.220513 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:29.220958 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 02:00:29.221137 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:29.221138 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:29.221377 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:29.221411 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.221492 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.221559 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:29.221614 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:29.221673 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:29.221837 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:29.222041 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { Names: ["api-complex-example-com-vd3t5n"] } I0407 02:00:29.222080 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:29.222112 6053 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/1" } I0407 02:00:29.222143 6053 listeners.go:103] DeleteListener v2 { ListenerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:listener/net/api-complex-example-com-vd3t5n/1/2" } I0407 02:00:29.222175 6053 listeners.go:56] CreateListener v2 { Certificates: [{ CertificateArn: "arn:aws-test:acm:us-east-1:123456789012:certificate/123456789012-1234-1234-1234-12345678" }], DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 443, Protocol: "TLS", SslPolicy: "ELBSecurityPolicy-2016-08" } I0407 02:00:29.222263 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1", Port: 8443, Protocol: "TCP" } I0407 02:00:29.222333 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.222368 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } W0407 02:00:29.222409 6053 api.go:53] PageSize not implemented I0407 02:00:29.222459 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 02:00:29.222508 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:29.222584 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:29.222601 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:29.222616 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.222681 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:29.222723 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:29.222714 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:29.222807 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:29.222780 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:29.222837 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.223000 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:29.223057 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.223228 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:29.223295 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:29.228835 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 02:00:29.228976 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.229143 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.229327 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.229487 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.230048 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 02:00:29.230279 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 02:00:29.230485 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run I0407 02:00:29.230536 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:29.230575 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:29.230643 6053 dns.go:235] Pre-creating DNS records I0407 02:00:29.238558 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:29.242822 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:29.242914 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.308574 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:30.490097 6053 iamrole.go:89] ListRoles: { } I0407 02:00:30.492329 6053 executor.go:111] Tasks: 0 done / 135 total; 51 can run I0407 02:00:30.492565 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0407 02:00:30.492723 6053 api.go:53] PageSize not implemented I0407 02:00:30.493019 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:30.493202 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.493350 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.493491 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:30.493779 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.493888 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:30.493920 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:30.493978 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:30.494018 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:30.494276 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.494497 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:30.496422 6053 executor.go:111] Tasks: 51 done / 135 total; 28 can run I0407 02:00:30.496572 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.496726 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:30.496817 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:30.496761 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:30.496868 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:30.496846 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:30.496902 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:30.496932 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.496990 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:30.497078 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:30.497113 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:30.497241 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:30.497128 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.497299 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:30.497383 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:30.497569 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:30.497638 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:30.497780 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:30.497856 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:30.498078 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:30.498154 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.498294 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.498455 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:30.498561 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:30.498686 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:30.498802 6053 executor.go:111] Tasks: 79 done / 135 total; 38 can run I0407 02:00:30.499141 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:30.499241 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:30.499465 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:30.499563 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:30.499916 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:30.500186 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0407 02:00:30.500345 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:30.500460 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:30.500642 6053 executor.go:111] Tasks: 117 done / 135 total; 2 can run I0407 02:00:30.500730 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:30.500754 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:30.500841 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:30.500874 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.500939 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.501001 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:30.501063 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:30.501123 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:30.501176 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:30.501300 6053 api.go:53] PageSize not implemented I0407 02:00:30.501369 6053 executor.go:111] Tasks: 119 done / 135 total; 4 can run I0407 02:00:30.501438 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:30.501499 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:30.501462 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:30.501552 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:30.501526 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.501586 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:30.501646 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:30.501668 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:30.501697 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.501818 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:30.501871 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:30.501894 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.502072 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:30.502132 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:30.507424 6053 executor.go:111] Tasks: 123 done / 135 total; 4 can run I0407 02:00:30.507613 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.507765 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.507860 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.508033 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.508900 6053 executor.go:111] Tasks: 127 done / 135 total; 2 can run I0407 02:00:30.509177 6053 executor.go:111] Tasks: 129 done / 135 total; 6 can run I0407 02:00:30.509469 6053 executor.go:111] Tasks: 135 done / 135 total; 0 can run lifecycle_integration_test.go:216: overriding cluster values [spec.api.loadBalancer.additionalSecurityGroups=sg-123456] I0407 02:00:30.512929 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:30.516463 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:30.528633 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:30.532745 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:30.532836 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:31.815198 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:31.994885 6053 iamrole.go:89] ListRoles: { } I0407 02:00:31.999357 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:31.999676 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } W0407 02:00:31.999888 6053 api.go:53] PageSize not implemented I0407 02:00:31.999974 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:32.000174 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:32.000191 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:32.000458 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:32.000636 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.000800 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:32.001064 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] }] } I0407 02:00:32.001212 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:32.001547 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.001655 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:32.001690 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:32.001777 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:32.003774 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:32.003917 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:32.004041 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:32.004030 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:32.004068 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:32.004201 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:32.004195 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:32.004115 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:32.004260 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:32.004338 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:32.004364 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:32.004453 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:32.004421 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.004501 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:32.004576 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:32.004668 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:32.004826 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:32.004879 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:32.005093 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:32.005178 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:32.005326 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.005496 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:32.005540 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.005656 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.005760 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.005856 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:32.005957 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:32.006207 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:32.006326 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:32.006748 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:32.006990 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:32.007085 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:32.007219 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:32.007355 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:32.007608 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:32.007871 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:32.008019 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:32.008058 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:32.008182 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:32.008224 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.008302 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.008350 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:32.008417 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:32.008461 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:32.008493 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:32.008589 6053 api.go:53] PageSize not implemented I0407 02:00:32.008647 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:32.008729 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:32.008722 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0407 02:00:32.008776 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0407 02:00:32.008788 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:32.008835 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:32.008911 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:32.008812 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.009044 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:32.009101 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:32.009124 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.009245 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:32.009303 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.009454 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:32.009504 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:32.014959 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:32.015103 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.015256 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.015363 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.015542 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.016012 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.016082 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.016346 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:32.016603 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:32.016858 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:32.016913 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:32.016958 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:32.017026 6053 dns.go:235] Pre-creating DNS records I0407 02:00:32.024977 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:32.029188 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:32.029281 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.321232 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:33.504244 6053 iamrole.go:89] ListRoles: { } I0407 02:00:33.506536 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:33.506833 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:33.507016 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.507207 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:33.507256 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:33.507372 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:33.507451 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.507685 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0407 02:00:33.507803 6053 api.go:53] PageSize not implemented I0407 02:00:33.507848 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.507979 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:33.508052 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:33.508210 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:33.508734 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:33.508882 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.510793 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:33.510953 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:33.510996 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.511089 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:33.511209 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:33.511117 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:33.511223 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:33.511307 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:33.511436 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:33.511359 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:33.511485 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:33.511542 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:33.511577 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:33.511685 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:33.511895 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:33.511971 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.512147 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:33.512218 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.512347 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:33.512492 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:33.512666 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:33.512796 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:33.512904 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.513039 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:33.513155 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:33.513254 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:33.513454 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:33.513776 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:33.513910 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:33.514160 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:33.514301 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:33.514485 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:33.514607 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:33.514879 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:33.515176 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:33.515296 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:33.515383 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:33.515402 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:33.515494 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:33.515518 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.515569 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.515609 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:33.515649 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:33.515681 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:33.515715 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:33.515815 6053 api.go:53] PageSize not implemented I0407 02:00:33.515887 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:33.515973 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:33.516023 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:33.515987 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0407 02:00:33.516051 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:33.516083 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0407 02:00:33.516063 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:33.516118 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.516216 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:33.516268 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:33.516296 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.516455 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:33.516515 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.516653 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:33.516685 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:33.521846 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:33.521978 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.522137 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.522309 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.522481 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.523283 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:33.523605 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:33.523859 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t3.large] I0407 02:00:33.528718 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:33.532124 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.532212 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.541841 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:33.545964 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.546053 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:33.546114 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:34.860729 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:35.042585 6053 iamrole.go:89] ListRoles: { } I0407 02:00:35.044699 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:35.045021 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0407 02:00:35.045282 6053 api.go:53] PageSize not implemented I0407 02:00:35.045352 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.045612 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:35.045797 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:35.046282 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:35.046437 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.046812 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.046932 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:35.046965 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:35.047029 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:35.047326 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:35.047413 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:35.047655 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.048648 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:35.048808 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:35.048791 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.048912 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:35.048979 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:35.049055 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:35.049114 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:35.048978 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:35.049099 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:35.049198 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:35.049235 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:35.049205 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.049395 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:35.049567 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:35.049614 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:35.049714 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:35.049825 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:35.049988 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:35.050031 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:35.050137 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:35.050185 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:35.050268 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0407 02:00:35.050406 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.050535 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:35.050619 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.050753 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:35.050909 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:35.051084 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:35.051572 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:35.051659 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:35.051833 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:35.052089 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:35.052257 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:35.052508 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:35.052893 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:35.053030 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:35.053104 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:35.053135 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:35.053227 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:35.053248 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.053301 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.053339 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:35.053384 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:35.053421 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:35.053454 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:35.053558 6053 api.go:53] PageSize not implemented I0407 02:00:35.053632 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:35.053715 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:35.053724 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } I0407 02:00:35.053793 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" W0407 02:00:35.053802 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:35.053826 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:35.053869 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:35.053847 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.054028 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:35.054095 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.054270 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:35.054328 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.054478 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:35.054558 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:35.054583 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:35.061082 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:35.061247 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.061467 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.061681 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.061916 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.062635 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:35.063089 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:35.063343 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:35.063393 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:35.063431 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:35.063498 6053 dns.go:235] Pre-creating DNS records I0407 02:00:35.071452 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:35.075651 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.075745 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:35.075801 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.387053 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:36.565832 6053 iamrole.go:89] ListRoles: { } I0407 02:00:36.569440 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:36.569853 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:36.570391 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.571268 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:36.571334 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:36.571411 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:36.571461 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:36.571562 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:36.571731 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.572237 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.572447 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.573090 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0407 02:00:36.573437 6053 api.go:53] PageSize not implemented I0407 02:00:36.573923 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:36.574194 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:36.575465 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:36.575604 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] }] } I0407 02:00:36.575652 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:36.575749 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:36.575788 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:36.575731 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.575879 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:36.575879 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:36.575957 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:36.575997 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:36.575914 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.575969 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:36.576168 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:36.576294 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:36.576467 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:36.576526 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:36.576623 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.576768 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:36.576816 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.576951 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:36.577039 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:36.577127 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:36.577275 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:36.577326 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:36.577545 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:36.577603 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:36.577842 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:36.578018 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:36.578189 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:36.578466 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:36.578605 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:36.578857 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:36.579072 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:36.579329 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:36.579425 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:36.579944 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:36.580029 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:36.580095 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:36.580060 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:36.580114 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.580152 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.580187 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:36.580222 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:36.580256 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:36.580287 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:36.580371 6053 api.go:53] PageSize not implemented I0407 02:00:36.580417 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:36.580492 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:36.580538 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:36.580505 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:36.580631 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:36.580568 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:36.580664 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.580754 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:36.580826 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:36.580870 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.581000 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:36.581053 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:36.581077 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.581181 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:36.581237 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:36.586676 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:36.586858 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.587066 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.587280 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.587451 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.587977 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:36.588289 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:36.588573 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run lifecycle_integration_test.go:244: overriding instance group values (nodes) [spec.mixedInstancesPolicy.instances=t2.medium] I0407 02:00:36.591446 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:36.594879 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.594965 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.595016 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.604892 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:36.609053 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.609143 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.609218 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:36.609268 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:37.931217 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:38.113890 6053 iamrole.go:89] ListRoles: { } I0407 02:00:38.116057 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:38.116343 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } W0407 02:00:38.116437 6053 api.go:53] PageSize not implemented I0407 02:00:38.116474 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:38.116575 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:38.116682 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } I0407 02:00:38.116803 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.116926 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:38.116980 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:38.117062 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:38.117123 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.117266 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:38.117512 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.117713 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:38.117834 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.119432 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:38.119568 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:38.119632 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:38.119684 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:38.119715 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.119703 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:38.119825 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:38.119832 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:38.119800 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:38.119863 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:38.119925 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:38.119932 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:38.119966 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:38.119973 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:38.120004 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:38.120036 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.120127 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:38.120158 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:38.120218 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:38.120261 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:38.120310 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:38.120355 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.120431 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:38.120528 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:38.120570 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.120714 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:38.121699 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:38.121985 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] }] } I0407 02:00:38.122124 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:38.122321 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:38.122500 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:38.122725 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:38.122911 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:38.123130 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:38.123477 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:38.123607 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:38.123695 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:38.123716 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:38.123794 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:38.123814 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.123856 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.123894 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:38.123933 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:38.123968 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:38.124001 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:38.124097 6053 api.go:53] PageSize not implemented I0407 02:00:38.124162 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:38.124213 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:38.124261 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:38.124308 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:38.124286 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.124372 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:38.124470 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:38.124399 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:38.124594 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:38.124523 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.124702 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:38.124781 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:38.124821 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.124992 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:38.125038 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:38.129935 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:38.130060 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.130226 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.130334 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.130497 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.131299 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:38.131640 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:38.131903 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:38.131968 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:38.132034 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:38.132138 6053 dns.go:235] Pre-creating DNS records I0407 02:00:38.140153 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* Kops support for this Kubernetes version is deprecated and will be removed in a future release. Upgrading Kubernetes is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.25.0 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.24.17 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.24.17 ********************************************************************************* I0407 02:00:38.144438 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.144561 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.144644 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:38.144721 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.460436 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:39.644272 6053 iamrole.go:89] ListRoles: { } I0407 02:00:39.646547 6053 executor.go:111] Tasks: 0 done / 136 total; 52 can run I0407 02:00:39.646968 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid3"] } I0407 02:00:39.647182 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-main.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.647469 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid6"] } W0407 02:00:39.647599 6053 api.go:53] PageSize not implemented I0407 02:00:39.647687 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.647882 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:39.647938 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:39.648045 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:39.648173 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid5"] } I0407 02:00:39.648358 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:39.648674 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-exampleid4"] } I0407 02:00:39.648826 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-123456"] } I0407 02:00:39.649150 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:39.650155 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["a.etcd-events.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.651780 6053 executor.go:111] Tasks: 52 done / 136 total; 28 can run I0407 02:00:39.651931 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tcp-complex-example-com-vpjolq"] } I0407 02:00:39.651999 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:39.652060 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:39.652124 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } I0407 02:00:39.652147 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:39.652012 6053 iamrole.go:161] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:39.652324 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:39.652262 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["tls-complex-example-com-5nursn"] } I0407 02:00:39.652318 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-utility.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.652430 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:39.652485 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } I0407 02:00:39.652521 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:39.652589 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["api-elb.complex.example.com"] } ] } I0407 02:00:39.652853 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:39.652917 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:39.653016 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] },{ Name: "tag:Name", Values: ["complex.example.com"] }] } I0407 02:00:39.653158 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:39.653250 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.653377 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.complex.example.com"] } ] } I0407 02:00:39.653527 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:39.653588 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.complex.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.complex.example.com"] } ] } I0407 02:00:39.653822 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:39.653908 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.654102 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:39.654150 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.654343 6053 executor.go:111] Tasks: 80 done / 136 total; 38 can run I0407 02:00:39.654563 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:39.654678 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:39.654989 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:39.655124 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:39.655385 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-east-1a-private.complex.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.655549 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-3"] } I0407 02:00:39.655595 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:39.655793 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:39.656125 6053 executor.go:111] Tasks: 118 done / 136 total; 2 can run I0407 02:00:39.656214 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:39.656284 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:39.656305 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.656216 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:39.656350 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.656386 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } I0407 02:00:39.656430 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5"] } I0407 02:00:39.656467 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4"] } I0407 02:00:39.656501 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } W0407 02:00:39.656593 6053 api.go:53] PageSize not implemented I0407 02:00:39.656642 6053 executor.go:111] Tasks: 120 done / 136 total; 4 can run I0407 02:00:39.656713 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:39.656756 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:39.656757 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:39.656811 6053 dnsname.go:118] AliasTarget for "api.complex.example.com" is "api-complex-example-com-vd3t5n.amazonaws.com" I0407 02:00:39.656730 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:39.656848 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:39.656872 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.657015 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:39.657072 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:39.657101 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.657208 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:39.657261 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.657381 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { } I0407 02:00:39.657410 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.662686 6053 executor.go:111] Tasks: 124 done / 136 total; 4 can run I0407 02:00:39.662893 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.663048 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.663180 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.663362 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.664210 6053 executor.go:111] Tasks: 128 done / 136 total; 2 can run I0407 02:00:39.664483 6053 executor.go:111] Tasks: 130 done / 136 total; 6 can run I0407 02:00:39.664741 6053 executor.go:111] Tasks: 136 done / 136 total; 0 can run I0407 02:00:39.664934 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:39.664999 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:39.665040 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:39.665102 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:39.665134 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:39.665164 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:39.665194 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:39.665229 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:39.665270 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:39.665310 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:39.665345 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:39.665375 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:39.665412 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:39.665443 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:39.665478 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:39.665513 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:39.665547 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:39.665581 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:39.665617 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:39.665648 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:39.665684 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-3"] }] } I0407 02:00:39.665721 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:39.665751 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:39.665782 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:39.665818 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:39.665853 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:39.665891 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:39.668536 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:39.668605 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:39.668629 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:39.668666 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.668724 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0407 02:00:39.668789 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.668849 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.668901 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.668961 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.669005 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.669052 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } I0407 02:00:39.669109 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.669181 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["complex.example.com"] }] } I0407 02:00:39.669221 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/complex.example.com"] }] } W0407 02:00:39.669274 6053 api.go:53] PageSize not implemented I0407 02:00:39.669294 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:39.669319 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:39.669336 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1"] } I0407 02:00:39.669377 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:39.669401 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:39.669420 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" ] } I0407 02:00:39.669489 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:39.669525 6053 iamrole.go:89] ListRoles: { } I0407 02:00:39.669570 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:39.669598 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:39.669639 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:39.669690 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:39.669737 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0407 02:00:39.670298 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:39.670371 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:39.670414 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1" } autoscaling-group:nodes.complex.example.com ok autoscaling-config:lt-1 ok autoscaling-group:master-us-test-1a.masters.complex.example.com ok load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/api-complex-example-com-vd3t5n/1 ok I0407 02:00:39.670487 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:39.670537 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0407 02:00:39.670577 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } I0407 02:00:39.670591 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.complex.example.com" } iam-instance-profile:nodes.complex.example.com ok I0407 02:00:39.670614 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:39.670436 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-complex-example-com-vd3t5n.amazonaws.com", EvaluateTargetHealth: false, HostedZoneId: "HZ123456" }, Name: "api.complex.example.com", Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.complex.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/AAAA/api.complex.example.com ok I0407 02:00:39.670631 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tls-complex-example-com-5nursn/5 ok security-group:sg-3 ok I0407 02:00:39.670681 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0407 02:00:39.670628 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0407 02:00:39.670765 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:39.670817 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.complex.example.com" } iam-instance-profile:masters.complex.example.com ok I0407 02:00:39.670765 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/tcp-complex-example-com-vpjolq/4 ok I0407 02:00:39.670828 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 4 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.1.0.0/16" }], ToPort: 443 }, { FromPort: 8443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 8443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.2.0.0/16" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.0/24" }], ToPort: 443 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.0.0/16" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 8443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 8443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-44444444" }], ToPort: 443 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 } ] } W0407 02:00:39.671167 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:39.671191 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:39.671235 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-3" } subnet:subnet-3 ok I0407 02:00:39.671295 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok autoscaling-config:lt-2 ok I0407 02:00:39.671353 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:39.671403 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", PrefixListIds: [{ PrefixListId: "pl-66666666" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.1.1.1/32" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "1.2.3.4/32" }], ToPort: 32767 }, { FromPort: 28000, IpProtocol: "udp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 28000, IpProtocol: "tcp", IpRanges: [{ CidrIp: "10.20.30.0/24" }], ToPort: 32767 } ] } W0407 02:00:39.671607 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:39.671621 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:39.671700 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:39.671765 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.complex.example.com" } I0407 02:00:39.671802 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:39.671841 6053 iamrole.go:180] ListAttachedRolePolicies: masters.complex.example.com I0407 02:00:39.671860 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.complex.example.com", RoleName: "masters.complex.example.com" } I0407 02:00:39.671896 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.complex.example.com" } iam-role:masters.complex.example.com ok I0407 02:00:39.671933 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.complex.example.com" } I0407 02:00:39.671986 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.complex.example.com I0407 02:00:39.672001 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.complex.example.com", RoleName: "nodes.complex.example.com" } I0407 02:00:39.672030 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.complex.example.com" } iam-role:nodes.complex.example.com ok I0407 02:00:39.672098 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0407 02:00:39.672176 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:39.672262 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleComplex (15.09s) === RUN TestLifecycleExternalLB I0407 02:00:39.672747 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:39.672882 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:39.672923 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:39.672965 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:39.673007 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:39.673058 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:39.673098 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:39.673127 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:39.673169 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:39.673198 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster externallb.example.com I0407 02:00:39.698023 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:39.701198 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:39.701289 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:40.977268 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:41.144089 6053 iamrole.go:89] ListRoles: { } I0407 02:00:41.146116 6053 executor.go:111] Tasks: 0 done / 107 total; 51 can run W0407 02:00:41.146408 6053 api.go:53] PageSize not implemented I0407 02:00:41.146404 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0407 02:00:41.146444 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:41.146513 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0407 02:00:41.146464 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } I0407 02:00:41.146551 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0407 02:00:41.146585 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0407 02:00:41.146563 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.146640 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:41.146724 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } I0407 02:00:41.146763 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:41.146803 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0407 02:00:41.146798 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] } I0407 02:00:41.146762 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.146826 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.147010 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:41.147076 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:41.147144 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:41.147211 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:41.147266 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.147412 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:41.147498 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] }] } I0407 02:00:41.147775 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } W0407 02:00:41.147914 6053 api.go:53] PageSize not implemented I0407 02:00:41.148013 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.148171 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.148160 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0407 02:00:41.148300 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0407 02:00:41.148350 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } I0407 02:00:41.148403 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } W0407 02:00:41.148481 6053 api.go:53] PageSize not implemented I0407 02:00:41.148501 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:41.148690 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:41.148781 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:41.150043 6053 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0407 02:00:41.150156 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:41.150237 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0407 02:00:41.150367 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0407 02:00:41.150275 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.150412 6053 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0407 02:00:41.150449 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0407 02:00:41.150671 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0407 02:00:41.150695 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:41.150618 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:41.150803 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:41.150870 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:41.150916 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:41.151093 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:41.151101 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0407 02:00:41.151144 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0407 02:00:41.151339 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.externallb.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:41.151438 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.151533 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:41.151619 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:41.151682 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:41.151767 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.151923 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:41.152015 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:41.152114 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:41.152165 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:41.152214 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:41.152348 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:41.152443 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:41.152492 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "externallb.example.com" }, { Key: "KubernetesCluster", Value: "externallb.example.com" }, { Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0407 02:00:41.152743 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/externallb.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/externallb.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"externallb.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0407 02:00:41.155983 6053 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0407 02:00:41.156212 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-2382to4000-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.156403 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:41.156572 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:41.156716 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.156935 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.157158 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:41.157263 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:41.157449 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.externallb.example.com" }] }] } I0407 02:00:41.157644 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:41.157744 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:41.157844 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-all-0to0-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.158120 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.158313 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:41.158459 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:41.158594 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.158791 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-4003to65535-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.158972 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" }] }] } I0407 02:00:41.159167 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-::/0" }] }] } I0407 02:00:41.159330 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.externallb.example.com-ingress-all-0to0-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.159484 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-udp-1to65535-masters.externallb.example.com" }] }] } I0407 02:00:41.159642 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.externallb.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 02:00:41.159791 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:41.159870 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:41.159927 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:41.159981 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.externallb.example.com-ingress-tcp-1to2379-masters.externallb.example.com" },{ Key: "KubernetesCluster", Value: "externallb.example.com" },{ Key: "kubernetes.io/cluster/externallb.example.com", Value: "owned" }] }] } I0407 02:00:41.160211 6053 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0407 02:00:41.160566 6053 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0407 02:00:41.160892 6053 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0407 02:00:41.160966 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:41.161010 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:41.161078 6053 dns.go:235] Pre-creating DNS records I0407 02:00:41.161110 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:41.167170 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:41.170332 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:41.170422 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.492291 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:42.656707 6053 iamrole.go:89] ListRoles: { } I0407 02:00:42.657943 6053 executor.go:111] Tasks: 0 done / 107 total; 51 can run W0407 02:00:42.658187 6053 api.go:53] PageSize not implemented I0407 02:00:42.658279 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0407 02:00:42.658280 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:42.658419 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0407 02:00:42.658446 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2" } I0407 02:00:42.658399 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.externallb.example.com"] }] } I0407 02:00:42.658619 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0407 02:00:42.658680 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1"] } I0407 02:00:42.658713 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1" } W0407 02:00:42.658757 6053 api.go:53] PageSize not implemented I0407 02:00:42.658826 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.658998 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.659346 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.externallb.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:42.659541 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.659645 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:42.659666 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:42.659700 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } W0407 02:00:42.659747 6053 api.go:53] PageSize not implemented I0407 02:00:42.659810 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:42.659857 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:42.659875 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3" } I0407 02:00:42.663089 6053 executor.go:111] Tasks: 51 done / 107 total; 23 can run I0407 02:00:42.663538 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.externallb.example.com"] } ] } I0407 02:00:42.663829 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:42.663977 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:42.664097 6053 iamrole.go:161] ListAttachedRolePolicies: masters.externallb.example.com I0407 02:00:42.664081 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.664897 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.665092 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:42.665169 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:42.665331 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.externallb.example.com I0407 02:00:42.665296 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["externallb.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.665453 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.externallb.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.externallb.example.com"] } ] } I0407 02:00:42.666168 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:42.670741 6053 executor.go:111] Tasks: 74 done / 107 total; 25 can run I0407 02:00:42.671083 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.671258 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.671411 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:42.671576 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:42.671766 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.671913 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.672088 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:42.672670 6053 executor.go:111] Tasks: 99 done / 107 total; 2 can run I0407 02:00:42.672955 6053 executor.go:111] Tasks: 101 done / 107 total; 6 can run I0407 02:00:42.673253 6053 executor.go:111] Tasks: 107 done / 107 total; 0 can run I0407 02:00:42.676945 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:42.677013 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:42.677055 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:42.677087 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:42.677119 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:42.677147 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:42.677180 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:42.677211 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:42.677245 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:42.677278 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:42.677319 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:42.677349 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:42.677379 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:42.677409 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:42.677438 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:42.677470 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:42.677502 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:42.677535 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:42.677564 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:42.677596 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:42.677624 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:42.677658 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:42.677695 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:42.677729 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:42.679076 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:42.679138 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:42.679160 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:42.679203 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679257 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0407 02:00:42.679313 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679376 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679424 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679480 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679523 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679560 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } I0407 02:00:42.679610 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679662 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["externallb.example.com"] }] } I0407 02:00:42.679699 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/externallb.example.com"] }] } W0407 02:00:42.679752 6053 api.go:53] PageSize not implemented I0407 02:00:42.679775 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:42.679803 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:42.679823 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:42.679847 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:42.679865 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2"] } I0407 02:00:42.679916 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:42.679957 6053 iamrole.go:89] ListRoles: { } I0407 02:00:42.680003 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:42.680035 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:42.680079 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:42.680124 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:42.680157 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } autoscaling-group:nodes.externallb.example.com ok I0407 02:00:42.680577 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0407 02:00:42.680640 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.externallb.example.com" } iam-instance-profile:nodes.externallb.example.com ok I0407 02:00:42.680620 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } autoscaling-group:master-us-test-1a.masters.externallb.example.com ok I0407 02:00:42.680847 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0407 02:00:42.680717 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } I0407 02:00:42.680911 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.externallb.example.com" } iam-instance-profile:masters.externallb.example.com ok W0407 02:00:42.680936 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:42.680957 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:42.680769 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.externallb.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.externallb.example.com. ok I0407 02:00:42.681021 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:42.681137 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0407 02:00:42.681189 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:42.681253 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-config:lt-2 ok autoscaling-config:lt-1 ok I0407 02:00:42.681323 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:42.681380 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:42.681432 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0407 02:00:42.681562 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:42.681580 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:42.681656 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:42.681731 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.externallb.example.com" } I0407 02:00:42.681828 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.externallb.example.com I0407 02:00:42.681847 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.externallb.example.com", RoleName: "nodes.externallb.example.com" } I0407 02:00:42.681886 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.externallb.example.com" } iam-role:nodes.externallb.example.com ok I0407 02:00:42.681927 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.externallb.example.com" } I0407 02:00:42.681978 6053 iamrole.go:180] ListAttachedRolePolicies: masters.externallb.example.com I0407 02:00:42.681993 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.externallb.example.com", RoleName: "masters.externallb.example.com" } I0407 02:00:42.682022 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.externallb.example.com" } iam-role:masters.externallb.example.com ok I0407 02:00:42.682087 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:42.682167 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:42.682240 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleExternalLB (3.01s) === RUN TestLifecycleSharedSubnet I0407 02:00:42.682738 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:42.682886 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:42.682924 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:42.682970 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:42.683012 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:42.683065 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:42.683108 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:42.683141 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:42.683184 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:42.683213 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster sharedsubnet.example.com I0407 02:00:42.707192 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:42.710388 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:42.710473 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:43.999654 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:44.174547 6053 iamrole.go:89] ListRoles: { } I0407 02:00:44.175940 6053 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0407 02:00:44.176860 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:44.177017 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0407 02:00:44.177161 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0407 02:00:44.177180 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:44.177359 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:44.177511 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:44.177617 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:44.177652 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:44.177710 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "sharedsubnet.example.com" }] }] } I0407 02:00:44.177805 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } I0407 02:00:44.177951 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", Tags: [{ Key: "Name", Value: "masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] } I0407 02:00:44.177961 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:44.178196 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:44.178275 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.sharedsubnet.example.com" }, { Key: "KubernetesCluster", Value: "sharedsubnet.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:44.178406 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:44.178499 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:44.180228 6053 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0407 02:00:44.180358 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0407 02:00:44.180477 6053 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0407 02:00:44.180534 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0407 02:00:44.180486 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0407 02:00:44.180643 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0407 02:00:44.180699 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0407 02:00:44.180635 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0407 02:00:44.180848 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "masters.sharedsubnet.example.com" }] }], VpcId: "vpc-12345678" } I0407 02:00:44.180961 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:44.181019 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:44.181070 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:44.181182 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:44.181062 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0407 02:00:44.181227 6053 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [ { Key: "kubernetes.io/role/internal-elb", Value: "1" }, { Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "shared" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] } I0407 02:00:44.181307 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.sharedsubnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:44.181387 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:44.181430 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:44.182756 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/sharedsubnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/sharedsubnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"sharedsubnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0407 02:00:44.185757 6053 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0407 02:00:44.185955 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-udp-1to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0407 02:00:44.186139 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" }] }] } I0407 02:00:44.186454 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.186628 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.186896 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-4003to65535-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.187124 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.sharedsubnet.example.com" }] }] } I0407 02:00:44.187386 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-all-0to0-nodes.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.187705 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.187880 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-2382to4000-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0407 02:00:44.188108 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.sharedsubnet.example.com" }] }] } I0407 02:00:44.188332 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" }] }] } I0407 02:00:44.188510 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:44.188622 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:44.188774 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.188991 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:44.189111 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:44.189246 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.sharedsubnet.example.com-ingress-tcp-1to2379-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.189444 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.sharedsubnet.example.com-ingress-all-0to0-masters.sharedsubnet.example.com" },{ Key: "KubernetesCluster", Value: "sharedsubnet.example.com" },{ Key: "kubernetes.io/cluster/sharedsubnet.example.com", Value: "owned" }] }] } I0407 02:00:44.189696 6053 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0407 02:00:44.190014 6053 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0407 02:00:44.190305 6053 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0407 02:00:44.190356 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:44.190397 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:44.190463 6053 dns.go:235] Pre-creating DNS records I0407 02:00:44.190493 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:44.196198 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:44.199370 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:44.199461 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.486502 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:45.664757 6053 iamrole.go:89] ListRoles: { } I0407 02:00:45.666093 6053 executor.go:111] Tasks: 0 done / 94 total; 44 can run I0407 02:00:45.666450 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:45.666558 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:45.666594 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:45.666587 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:45.666647 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.667298 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.sharedsubnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.667590 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.sharedsubnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:45.669481 6053 executor.go:111] Tasks: 44 done / 94 total; 20 can run I0407 02:00:45.669622 6053 iamrole.go:161] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0407 02:00:45.669656 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:45.669918 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0407 02:00:45.669800 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.sharedsubnet.example.com"] } ] } I0407 02:00:45.670035 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:45.670134 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.sharedsubnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.sharedsubnet.example.com"] } ] } I0407 02:00:45.670393 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:45.670503 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0407 02:00:45.675268 6053 executor.go:111] Tasks: 64 done / 94 total; 22 can run I0407 02:00:45.675429 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.675668 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.676049 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.676197 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.677013 6053 executor.go:111] Tasks: 86 done / 94 total; 2 can run I0407 02:00:45.677243 6053 executor.go:111] Tasks: 88 done / 94 total; 6 can run I0407 02:00:45.677477 6053 executor.go:111] Tasks: 94 done / 94 total; 0 can run I0407 02:00:45.680053 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:45.680119 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:45.680155 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:45.680186 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:45.680219 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:45.680251 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:45.680285 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:45.680325 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:45.680365 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:45.680395 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:45.680425 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:45.680454 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:45.680486 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:45.680516 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:45.680549 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:45.680576 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:45.680607 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:45.680644 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:45.680679 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:45.682016 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:45.682081 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:45.682102 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:45.682143 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682191 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0407 02:00:45.682246 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682304 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682345 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682387 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682434 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682468 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } I0407 02:00:45.682505 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682546 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["sharedsubnet.example.com"] }] } I0407 02:00:45.682582 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/sharedsubnet.example.com"] }] } W0407 02:00:45.682632 6053 api.go:53] PageSize not implemented I0407 02:00:45.682657 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:45.682685 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:45.682705 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:45.682729 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:45.682750 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:45.682801 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:45.682842 6053 iamrole.go:89] ListRoles: { } I0407 02:00:45.682886 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:45.682917 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:45.682965 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:45.683005 6053 routetable.go:53] DescribeRouteTables: { } autoscaling-config:lt-2 ok I0407 02:00:45.683395 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } autoscaling-group:nodes.sharedsubnet.example.com ok I0407 02:00:45.683454 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.sharedsubnet.example.com" } iam-instance-profile:masters.sharedsubnet.example.com ok I0407 02:00:45.683496 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } autoscaling-group:master-us-test-1a.masters.sharedsubnet.example.com ok I0407 02:00:45.683542 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.sharedsubnet.example.com" } I0407 02:00:45.683506 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } iam-instance-profile:nodes.sharedsubnet.example.com ok volume:vol-1 ok I0407 02:00:45.683424 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.sharedsubnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:45.683615 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } route53-record:Z1AFAKE1ZON3YO/A/api.internal.sharedsubnet.example.com. ok keypair:key-1 ok I0407 02:00:45.683711 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok autoscaling-config:lt-1 ok I0407 02:00:45.683791 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:45.683849 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0407 02:00:45.684049 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:45.684071 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:45.684105 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:45.684150 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }] } W0407 02:00:45.684259 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:45.684273 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:45.684344 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.sharedsubnet.example.com" } I0407 02:00:45.684392 6053 iamrole.go:180] ListAttachedRolePolicies: masters.sharedsubnet.example.com I0407 02:00:45.684419 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.sharedsubnet.example.com" } I0407 02:00:45.684503 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.sharedsubnet.example.com I0407 02:00:45.684520 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.sharedsubnet.example.com", RoleName: "nodes.sharedsubnet.example.com" } I0407 02:00:45.684554 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.sharedsubnet.example.com" } iam-role:nodes.sharedsubnet.example.com ok I0407 02:00:45.684594 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.sharedsubnet.example.com", RoleName: "masters.sharedsubnet.example.com" } I0407 02:00:45.684627 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.sharedsubnet.example.com" } iam-role:masters.sharedsubnet.example.com ok --- PASS: TestLifecycleSharedSubnet (3.00s) === RUN TestLifecyclePrivateSharedSubnet I0407 02:00:45.685125 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:45.685261 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:45.685299 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:45.685338 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:45.685374 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:45.685423 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:45.685465 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:45.685494 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:45.685530 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:45.685560 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-subnet.example.com I0407 02:00:45.713037 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:45.716510 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.716591 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:45.716647 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.022055 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:47.196030 6053 iamrole.go:89] ListRoles: { } I0407 02:00:47.197919 6053 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0407 02:00:47.198221 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } I0407 02:00:47.198338 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0407 02:00:47.198556 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:47.198885 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:47.199062 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:47.199121 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } I0407 02:00:47.199202 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0407 02:00:47.199376 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:47.199528 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:47.199582 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:47.199751 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } I0407 02:00:47.199847 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] } I0407 02:00:47.200718 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] }] } I0407 02:00:47.200923 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-subnet.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:47.201075 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:47.201325 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:47.201485 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:47.201521 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.202489 6053 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0407 02:00:47.202605 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:47.202647 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0407 02:00:47.202750 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0407 02:00:47.202735 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0407 02:00:47.202831 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0407 02:00:47.202916 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0407 02:00:47.202971 6053 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0407 02:00:47.202887 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-su-5ol32q", Port: 22, Protocol: "TCP", Tags: [{ Key: "Name", Value: "bastion-private-shared-su-5ol32q" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0407 02:00:47.203015 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0407 02:00:47.202912 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0407 02:00:47.203031 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0407 02:00:47.203141 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0407 02:00:47.203157 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0407 02:00:47.203258 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0407 02:00:47.203420 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0407 02:00:47.203507 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0407 02:00:47.203649 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:47.203712 6053 tags.go:42] CreateTags { Resources: ["subnet-abcdef"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" },{ Key: "SubnetType", Value: "Utility" },{ Key: "kubernetes.io/role/elb", Value: "1" }] } I0407 02:00:47.203790 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0407 02:00:47.203980 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0407 02:00:47.204227 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:47.204342 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:47.204398 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:47.204436 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api-elb.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }], VpcId: "vpc-12345678" } I0407 02:00:47.204528 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:47.204613 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:47.204654 6053 tags.go:42] CreateTags { Resources: ["subnet-12345678"], Tags: [{ Key: "SubnetType", Value: "Private" },{ Key: "kubernetes.io/role/internal-elb", Value: "1" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "shared" }] } I0407 02:00:47.204722 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:47.204781 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:47.204825 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:47.204875 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:47.204911 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-subnet.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:47.204996 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:47.205038 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:47.204989 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-subnet.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-subnet.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-subnet.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0407 02:00:47.205406 6053 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0407 02:00:47.205575 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } W0407 02:00:47.205722 6053 api.go:53] PageSize not implemented I0407 02:00:47.205783 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:47.205872 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:47.205872 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:47.205819 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-2382to4000-masters.private-shared-subnet.example.com" }] }] } I0407 02:00:47.205968 6053 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-subnet.example.com" }] } I0407 02:00:47.206044 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:47.205991 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-su-5ol32q", SubnetMappings: [{ SubnetId: "subnet-abcdef" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }], Type: "network" } I0407 02:00:47.206084 6053 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0407 02:00:47.206032 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.206144 6053 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-subnet-n2f8ak" } I0407 02:00:47.206260 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:47.206374 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0407 02:00:47.206555 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-subnet.example.com" }] }] } I0407 02:00:47.206729 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0407 02:00:47.206870 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0407 02:00:47.207002 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.207105 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.207284 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.207470 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.207606 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-masters.private-shared-subnet.example.com" }] }] } I0407 02:00:47.207730 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.207858 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0407 02:00:47.207897 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-udp-1to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0407 02:00:47.207974 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1", Port: 22, Protocol: "TCP" } I0407 02:00:47.208039 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } W0407 02:00:47.208149 6053 api.go:53] PageSize not implemented I0407 02:00:47.208171 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:47.208154 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208290 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208439 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208566 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-4003to65535-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208699 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208825 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-subnet.example.com-ingress-all-0to0-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.208954 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-subnet.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" },{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" }] }] } I0407 02:00:47.209081 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-subnet.example.com-ingress-tcp-1to2379-masters.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0407 02:00:47.209218 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-subnet.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-subnet.example.com-ingress-tcp-22to22-nodes.private-shared-subnet.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-subnet.example.com" }] }] } I0407 02:00:47.209347 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:47.209462 6053 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0407 02:00:47.209589 6053 api.go:53] PageSize not implemented I0407 02:00:47.209644 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } W0407 02:00:47.209701 6053 api.go:53] PageSize not implemented I0407 02:00:47.209763 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:47.209684 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:47.209899 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:47.210039 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:47.210128 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:47.215100 6053 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0407 02:00:47.215308 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.215433 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.215526 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.215690 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.216238 6053 executor.go:111] Tasks: 115 done / 123 total; 2 can run I0407 02:00:47.216503 6053 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0407 02:00:47.216866 6053 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0407 02:00:47.216920 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:47.216958 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:47.217026 6053 dns.go:235] Pre-creating DNS records I0407 02:00:47.217054 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:47.223288 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:47.226682 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.226768 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:47.226826 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.513548 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:48.696026 6053 iamrole.go:89] ListRoles: { } I0407 02:00:48.697853 6053 executor.go:111] Tasks: 0 done / 123 total; 46 can run I0407 02:00:48.698124 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.698443 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:48.698569 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:48.698628 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:48.698901 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:48.698974 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-subnet.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:48.699151 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-subnet.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.701260 6053 executor.go:111] Tasks: 46 done / 123 total; 26 can run I0407 02:00:48.701502 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0407 02:00:48.701458 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-su-5ol32q"] } I0407 02:00:48.701561 6053 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0407 02:00:48.701585 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0407 02:00:48.701650 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } I0407 02:00:48.701454 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-subnet.example.com"] } ] } I0407 02:00:48.701687 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0407 02:00:48.701855 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:48.701960 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-subnet.example.com"] } ] } I0407 02:00:48.702205 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:48.702273 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:48.702387 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-12345678"] } I0407 02:00:48.702543 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-abcdef"] } I0407 02:00:48.702682 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "tag:Name", Values: ["nodes.private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-subnet.example.com"] } ] } I0407 02:00:48.702841 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:48.702890 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-subnet.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-subnet.example.com"] } ] } I0407 02:00:48.703049 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:48.703698 6053 executor.go:111] Tasks: 72 done / 123 total; 31 can run I0407 02:00:48.703988 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:48.704096 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:48.703971 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.704114 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } W0407 02:00:48.704144 6053 api.go:53] PageSize not implemented I0407 02:00:48.704187 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0407 02:00:48.704146 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.704232 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0407 02:00:48.704205 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.704301 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4"] } I0407 02:00:48.704333 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } I0407 02:00:48.704340 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.704417 6053 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } W0407 02:00:48.704535 6053 api.go:53] PageSize not implemented I0407 02:00:48.704566 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.704816 6053 executor.go:111] Tasks: 103 done / 123 total; 5 can run W0407 02:00:48.704888 6053 api.go:53] PageSize not implemented I0407 02:00:48.704928 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.704930 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:48.704995 6053 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" W0407 02:00:48.705017 6053 api.go:53] PageSize not implemented I0407 02:00:48.705023 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:48.705084 6053 dnsname.go:118] AliasTarget for "api.private-shared-subnet.example.com" is "api-private-shared-subnet-n2f8ak.elb.cloudmock.com" I0407 02:00:48.705116 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.705285 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.705400 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.710833 6053 executor.go:111] Tasks: 108 done / 123 total; 7 can run I0407 02:00:48.710985 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.711203 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.711474 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.711646 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.712422 6053 executor.go:111] Tasks: 115 done / 123 total; 2 can run W0407 02:00:48.712554 6053 api.go:53] PageSize not implemented I0407 02:00:48.712583 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.712778 6053 executor.go:111] Tasks: 117 done / 123 total; 6 can run I0407 02:00:48.713080 6053 executor.go:111] Tasks: 123 done / 123 total; 0 can run I0407 02:00:48.716345 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:48.716408 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:48.716444 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:48.716476 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:48.716512 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:48.716543 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:48.716578 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:48.716616 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:48.716652 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0407 02:00:48.716696 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:48.716728 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:48.716761 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:48.716791 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:48.716825 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:48.716858 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:48.716894 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:48.716927 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:48.716961 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:48.716994 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:48.717025 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:48.717061 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:48.717095 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:48.718566 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:48.718639 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:48.718660 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:48.718700 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.718756 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0407 02:00:48.718824 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.718887 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.718933 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.718978 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.719022 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.719056 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } I0407 02:00:48.719095 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.719140 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-subnet.example.com"] }] } I0407 02:00:48.719172 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-subnet.example.com"] }] } W0407 02:00:48.719218 6053 api.go:53] PageSize not implemented I0407 02:00:48.719236 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-subnet-n2f8ak"] } I0407 02:00:48.719278 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:48.719304 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:48.719319 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1"] } I0407 02:00:48.719360 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:48.719384 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:48.719401 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" ] } I0407 02:00:48.719458 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:48.719503 6053 iamrole.go:89] ListRoles: { } I0407 02:00:48.719549 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:48.719579 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:48.719621 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:48.719664 6053 routetable.go:53] DescribeRouteTables: { } autoscaling-group:master-us-test-1a.masters.private-shared-subnet.example.com ok I0407 02:00:48.720175 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok autoscaling-group:bastion.private-shared-subnet.example.com ok I0407 02:00:48.720252 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:48.720236 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4" } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-su-5ol32q/4 ok autoscaling-config:lt-2 ok autoscaling-group:nodes.private-shared-subnet.example.com ok autoscaling-config:lt-3 ok I0407 02:00:48.720338 6053 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-subnet-n2f8ak" } autoscaling-config:lt-1 ok I0407 02:00:48.720358 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-su-5ol32q/1 ok I0407 02:00:48.720321 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0407 02:00:48.720443 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-subnet.example.com" } load-balancer:api-private-shared-subnet-n2f8ak ok I0407 02:00:48.720411 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok iam-instance-profile:bastions.private-shared-subnet.example.com ok I0407 02:00:48.720511 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:48.720521 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0407 02:00:48.720628 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-subnet.example.com" } iam-instance-profile:masters.private-shared-subnet.example.com ok I0407 02:00:48.720433 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-subnet.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-subnet-n2f8ak.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-subnet.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.private-shared-subnet.example.com. ok I0407 02:00:48.720687 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } I0407 02:00:48.720741 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-subnet.example.com" } iam-instance-profile:nodes.private-shared-subnet.example.com ok I0407 02:00:48.720600 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-1" }] } ] } W0407 02:00:48.720821 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:48.720852 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0407 02:00:48.720891 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:48.720947 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 } ] } W0407 02:00:48.721079 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:48.721094 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok I0407 02:00:48.721125 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:48.721170 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0407 02:00:48.721275 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:48.721290 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:48.721367 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-subnet.example.com" } I0407 02:00:48.721415 6053 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-subnet.example.com I0407 02:00:48.721432 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-subnet.example.com", RoleName: "masters.private-shared-subnet.example.com" } I0407 02:00:48.721467 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-subnet.example.com" } iam-role:masters.private-shared-subnet.example.com ok I0407 02:00:48.721436 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:48.721500 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-subnet.example.com" } I0407 02:00:48.721587 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-subnet.example.com I0407 02:00:48.721516 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:48.721608 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-subnet.example.com", RoleName: "nodes.private-shared-subnet.example.com" } W0407 02:00:48.721630 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:48.721645 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-subnet.example.com" } iam-role:nodes.private-shared-subnet.example.com ok I0407 02:00:48.721648 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:48.721689 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-subnet.example.com" } I0407 02:00:48.721791 6053 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-subnet.example.com I0407 02:00:48.721811 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-subnet.example.com", RoleName: "bastions.private-shared-subnet.example.com" } I0407 02:00:48.721846 6053 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-subnet.example.com" } iam-role:bastions.private-shared-subnet.example.com ok --- PASS: TestLifecyclePrivateSharedSubnet (3.04s) === RUN TestLifecyclePrivateSharedIP I0407 02:00:48.722314 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:48.722453 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:48.722491 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:48.722536 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:48.722576 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:48.722625 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:48.722667 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:48.722699 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:48.722739 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:48.722766 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster private-shared-ip.example.com I0407 02:00:48.754834 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:48.758242 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.758335 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:48.758427 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.054404 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:50.226889 6053 iamrole.go:89] ListRoles: { } I0407 02:00:50.228644 6053 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0407 02:00:50.229037 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:50.229171 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:50.229290 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:50.229328 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:50.229365 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } I0407 02:00:50.229437 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0407 02:00:50.229500 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:50.229581 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0407 02:00:50.229658 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" }] } I0407 02:00:50.229761 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0407 02:00:50.230116 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:50.230354 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:50.230547 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } I0407 02:00:50.230580 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:50.230634 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", Tags: [{ Key: "Name", Value: "bastions.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] } I0407 02:00:50.230755 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] }] } I0407 02:00:50.230958 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:50.231124 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:50.233751 6053 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0407 02:00:50.233917 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0407 02:00:50.234186 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0407 02:00:50.233993 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0407 02:00:50.234379 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0407 02:00:50.234433 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0407 02:00:50.234636 6053 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0407 02:00:50.234634 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:50.234746 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeRegions\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0407 02:00:50.234840 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:50.234812 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0407 02:00:50.234952 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for bastion", GroupName: "bastion.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:50.235105 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:50.235177 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:50.235128 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] }], VpcId: "vpc-12345678" } I0407 02:00:50.235121 6053 targetgroups.go:94] CreateTargetGroup { HealthCheckIntervalSeconds: 10, HealthyThresholdCount: 2, Name: "bastion-private-shared-ip-eepmph", Port: 22, Protocol: "TCP", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "bastion-private-shared-ip-eepmph" }], UnhealthyThresholdCount: 2, VpcId: "vpc-12345678" } I0407 02:00:50.235227 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0407 02:00:50.235375 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:DescribeRegions\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0407 02:00:50.235352 6053 targetgroups.go:149] ModifyTargetGroupAttributes { Attributes: [{ Key: "deregistration_delay.connection_termination.enabled", Value: "true" },{ Key: "deregistration_delay.timeout_seconds", Value: "30" }], TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0407 02:00:50.235470 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for api ELB", GroupName: "api-elb.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "api-elb.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:50.235581 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0407 02:00:50.235713 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:50.235817 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:50.235918 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:50.235904 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0407 02:00:50.236103 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0407 02:00:50.236444 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] },{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] }] } I0407 02:00:50.236837 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:50.236851 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.4.0/22", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "utility-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Utility" }, { Key: "kubernetes.io/role/elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0407 02:00:50.236934 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }], VpcId: "vpc-12345678" } I0407 02:00:50.237041 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:50.237651 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:50.237734 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.private-shared-ip.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "masters.private-shared-ip.example.com" }] }], VpcId: "vpc-12345678" } I0407 02:00:50.237803 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] } I0407 02:00:50.237889 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:50.238008 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:50.237915 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Private" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-12345678" } I0407 02:00:50.238066 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:50.238115 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:50.238154 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["private-us-test-1a"] }] } I0407 02:00:50.239031 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:50.239135 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:50.239252 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:50.239179 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" }, { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" } ] }], VpcId: "vpc-12345678" } I0407 02:00:50.239320 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:50.239422 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:50.239480 6053 tags.go:42] CreateTags { Resources: ["rtb-2"], Tags: [ { Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }, { Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "private-us-test-1a" }, { Key: "Name", Value: "private-us-test-1a.private-shared-ip.example.com" } ] } I0407 02:00:50.240262 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/private-shared-ip.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/private-shared-ip.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcs\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"private-shared-ip.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0407 02:00:50.240641 6053 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0407 02:00:50.240831 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:50.240937 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0407 02:00:50.241045 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:50.241192 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:50.241241 6053 tags.go:42] CreateTags { Resources: ["eipalloc-12345678"], Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "shared" }] } I0407 02:00:50.241297 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:50.241386 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:50.241293 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } W0407 02:00:50.241437 6053 api.go:53] PageSize not implemented I0407 02:00:50.241497 6053 loadbalancers.go:81] CreateLoadBalancer v2 { IpAddressType: "ipv4", Name: "bastion-private-shared-ip-eepmph", SubnetMappings: [{ SubnetId: "subnet-1" }], Tags: [{ Key: "Name", Value: "bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }], Type: "network" } I0407 02:00:50.241486 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-2382to4000-masters.private-shared-ip.example.com" }] }] } I0407 02:00:50.241696 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:50.241737 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.241836 6053 tags.go:74] AddTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"], Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "api.private-shared-ip.example.com" }] } I0407 02:00:50.241970 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:50.241931 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0407 02:00:50.242031 6053 healthcheck.go:31] ConfigureHealthCheck: { HealthCheck: { HealthyThreshold: 2, Interval: 10, Target: "SSL:443", Timeout: 5, UnhealthyThreshold: 2 }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0407 02:00:50.242096 6053 attributes.go:31] ModifyLoadBalancerAttributes: { LoadBalancerAttributes: { AccessLog: { Enabled: false }, ConnectionDraining: { Enabled: true, Timeout: 300 }, ConnectionSettings: { IdleTimeout: 300 }, CrossZoneLoadBalancing: { Enabled: false } }, LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0407 02:00:50.242157 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-api-elb.private-shared-ip.example.com" }] }] } I0407 02:00:50.242378 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.242523 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:50.242608 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0407 02:00:50.242655 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.242812 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.242910 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-udp-1to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0407 02:00:50.243078 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-ingress-tcp-22to22-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.243294 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.243444 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:50.243526 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:50.243584 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:50.243631 6053 listeners.go:56] CreateListener v2 { DefaultActions: [{ TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4", Type: "forward" }], LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1", Port: 22, Protocol: "TCP" } W0407 02:00:50.243779 6053 api.go:53] PageSize not implemented I0407 02:00:50.243813 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:50.243726 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-4003to65535-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.243949 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-1", RouteTableId: "rtb-1" } I0407 02:00:50.243997 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-nodes.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" }] }] } I0407 02:00:50.244173 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-egress-all-0to0-::/0" }] }] } I0407 02:00:50.244336 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.244434 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }] } I0407 02:00:50.244584 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:50.244687 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-0.0.0.0/0" }] }] } I0407 02:00:50.244825 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-api-elb.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.244949 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.private-shared-ip.example.com-ingress-all-0to0-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.245101 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-2"] }] } I0407 02:00:50.245141 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-bastion.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.245263 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-ingress-tcp-1to2379-masters.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.245395 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-172.20.4.0/22-ingress-tcp-22to22-bastion.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.245524 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:50.245617 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.private-shared-ip.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.245744 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:50.245810 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 }] } I0407 02:00:50.245909 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-2", SubnetId: "subnet-2" } I0407 02:00:50.245952 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:50.246026 6053 executor.go:111] Tasks: 110 done / 132 total; 6 can run W0407 02:00:50.246154 6053 api.go:53] PageSize not implemented I0407 02:00:50.246240 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:50.246128 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:50.246298 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } W0407 02:00:50.246460 6053 api.go:53] PageSize not implemented I0407 02:00:50.246462 6053 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedNatgateway"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:50.246557 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:50.246526 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:50.246814 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:50.246790 6053 natgateway.go:74] CreateNatGateway: { AllocationId: "eipalloc-12345678", SubnetId: "subnet-1", TagSpecifications: [{ ResourceType: "natgateway", Tags: [{ Key: "Name", Value: "us-test-1a.private-shared-ip.example.com" },{ Key: "KubernetesCluster", Value: "private-shared-ip.example.com" },{ Key: "kubernetes.io/cluster/private-shared-ip.example.com", Value: "owned" }] }] } I0407 02:00:50.247034 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:50.246989 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "UPSERT", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } }] }, HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:50.247139 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:50.247211 6053 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedNatgateway", Value: "nat-1" }] } I0407 02:00:50.252390 6053 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0407 02:00:50.252604 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:50.252817 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", NatGatewayId: "nat-1", RouteTableId: "rtb-2" } I0407 02:00:50.253000 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.253141 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.253233 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.253400 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.254234 6053 executor.go:111] Tasks: 124 done / 132 total; 2 can run I0407 02:00:50.254550 6053 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0407 02:00:50.254908 6053 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0407 02:00:50.254964 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:50.255003 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:50.255097 6053 dns.go:235] Pre-creating DNS records I0407 02:00:50.255127 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:50.261369 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:50.264750 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.264839 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:50.264899 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.553747 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:51.723975 6053 iamrole.go:89] ListRoles: { } I0407 02:00:51.726430 6053 executor.go:111] Tasks: 0 done / 132 total; 46 can run I0407 02:00:51.727338 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.private-shared-ip.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:51.727612 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.728083 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:51.728334 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.728662 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-12345678"] } I0407 02:00:51.728783 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-12345678" } I0407 02:00:51.728818 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-12345678" } I0407 02:00:51.730527 6053 executor.go:111] Tasks: 46 done / 132 total; 28 can run I0407 02:00:51.730666 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "tag:Name", Values: ["bastion.private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["bastion.private-shared-ip.example.com"] } ] } I0407 02:00:51.730829 6053 iamrole.go:161] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0407 02:00:51.730808 6053 targetgroups.go:32] DescribeTargetGroups { Names: ["bastion-private-shared-ip-eepmph"] } I0407 02:00:51.730887 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0407 02:00:51.730929 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0407 02:00:51.730833 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.730931 6053 targetgroups.go:139] DescribeTargetGroupAttributes { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } I0407 02:00:51.731051 6053 iamrole.go:161] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0407 02:00:51.731067 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.731240 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["masters.private-shared-ip.example.com"] } ] } I0407 02:00:51.731417 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } I0407 02:00:51.731476 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:51.731528 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["nodes.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["nodes.private-shared-ip.example.com"] } ] } I0407 02:00:51.731671 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:51.731753 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-12345678"] }] } I0407 02:00:51.731915 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["api-elb.private-shared-ip.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }, { Name: "vpc-id", Values: ["vpc-12345678"] }, { Name: "group-name", Values: ["api-elb.private-shared-ip.example.com"] } ] } I0407 02:00:51.732080 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:51.732147 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["utility-us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.732291 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:51.732332 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.private-shared-ip.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.732451 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-2"] } I0407 02:00:51.732624 6053 executor.go:111] Tasks: 74 done / 132 total; 36 can run I0407 02:00:51.732854 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:51.732947 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:51.732871 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } W0407 02:00:51.732991 6053 api.go:53] PageSize not implemented I0407 02:00:51.733018 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:51.733037 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.732971 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0407 02:00:51.733164 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.733191 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0407 02:00:51.733232 6053 attributes.go:52] DescribeLoadBalancerAttributes: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } I0407 02:00:51.733188 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0407 02:00:51.733244 6053 listeners.go:32] DescribeListeners v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0407 02:00:51.733376 6053 targetgroups.go:32] DescribeTargetGroups { TargetGroupArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4"] } I0407 02:00:51.733419 6053 loadbalancers.go:156] DescribeLoadBalancerAttributes v2 { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } I0407 02:00:51.733308 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } W0407 02:00:51.733514 6053 api.go:53] PageSize not implemented I0407 02:00:51.733540 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.733734 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.733875 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.733982 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:51.734409 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:51.734564 6053 executor.go:111] Tasks: 110 done / 132 total; 6 can run I0407 02:00:51.734664 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } W0407 02:00:51.734691 6053 api.go:53] PageSize not implemented I0407 02:00:51.734751 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "Z1AFAKE1ZON3YO" } I0407 02:00:51.734678 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:51.734803 6053 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0407 02:00:51.734806 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.734843 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } W0407 02:00:51.734883 6053 api.go:53] PageSize not implemented I0407 02:00:51.734931 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.734733 6053 dnsname.go:118] AliasTarget for "api.private-shared-ip.example.com" is "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com" I0407 02:00:51.734994 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.735152 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.740304 6053 executor.go:111] Tasks: 116 done / 132 total; 8 can run I0407 02:00:51.740511 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.740686 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.740753 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.740930 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.741026 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-2"] } I0407 02:00:51.741539 6053 executor.go:111] Tasks: 124 done / 132 total; 2 can run W0407 02:00:51.741632 6053 api.go:53] PageSize not implemented I0407 02:00:51.741652 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.741871 6053 executor.go:111] Tasks: 126 done / 132 total; 6 can run I0407 02:00:51.742093 6053 executor.go:111] Tasks: 132 done / 132 total; 0 can run I0407 02:00:51.745323 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:51.745388 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:51.745426 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:51.745461 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:51.745497 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:51.745531 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:51.745565 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:51.745602 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:51.745643 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-3"] }] } I0407 02:00:51.745682 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-1"] }] } I0407 02:00:51.745716 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:51.745747 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:51.745776 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:51.745813 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:51.745844 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-2"] }] } I0407 02:00:51.745876 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:51.745909 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:51.745942 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-3"] }] } I0407 02:00:51.745975 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-4"] }] } I0407 02:00:51.746009 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:51.746048 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:51.746080 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-2"] }] } I0407 02:00:51.746114 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:51.746148 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:51.746179 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:51.746216 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:51.746251 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:51.747699 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:51.747768 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:51.747789 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:51.747831 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.747890 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0407 02:00:51.747956 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748023 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748069 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748113 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748155 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748197 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } I0407 02:00:51.748253 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748308 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:51.748339 6053 natgateway.go:117] DescribeNatGateways: { } I0407 02:00:51.748401 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["private-shared-ip.example.com"] }] } I0407 02:00:51.748442 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/private-shared-ip.example.com"] }] } W0407 02:00:51.748489 6053 api.go:53] PageSize not implemented I0407 02:00:51.748507 6053 tags.go:31] DescribeTags { LoadBalancerNames: ["api-private-shared-ip-exa-ohatqj"] } I0407 02:00:51.748548 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:51.748574 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:51.748591 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1"] } I0407 02:00:51.748630 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:51.748656 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:51.748674 6053 tags.go:64] DescribeTags v2 { ResourceArns: [ "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3", "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" ] } I0407 02:00:51.748734 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:51.748778 6053 iamrole.go:89] ListRoles: { } I0407 02:00:51.748826 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:51.748854 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:51.748906 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:51.748966 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:51.749004 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1","rtb-2"] } I0407 02:00:51.749044 6053 natgateway.go:117] DescribeNatGateways: { NatGatewayIds: ["nat-1"] } I0407 02:00:51.749078 6053 address.go:120] DescribeAddresses: { AllocationIds: ["eipalloc-12345678"] } I0407 02:00:51.749657 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0407 02:00:51.749723 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.private-shared-ip.example.com" } iam-instance-profile:nodes.private-shared-ip.example.com ok I0407 02:00:51.749707 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-3"] } I0407 02:00:51.749775 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0407 02:00:51.749823 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.private-shared-ip.example.com" } I0407 02:00:51.749787 6053 api.go:149] DeleteLoadBalancer: { LoadBalancerName: "api-private-shared-ip-exa-ohatqj" } autoscaling-group:bastion.private-shared-ip.example.com ok I0407 02:00:51.749793 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-3", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-3" }] },{ FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }] } W0407 02:00:51.749932 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:51.749914 6053 targetgroups.go:128] DeleteTargetGroup { TargetGroupArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4" } iam-instance-profile:masters.private-shared-ip.example.com ok I0407 02:00:51.749953 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-3" } security-group:sg-3 ok I0407 02:00:51.749941 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0407 02:00:51.750027 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "bastions.private-shared-ip.example.com" } load-balancer:api-private-shared-ip-exa-ohatqj ok I0407 02:00:51.750016 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok I0407 02:00:51.749857 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [ { Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "AAAA" } }, { Action: "DELETE", ResourceRecordSet: { Name: "api.internal.private-shared-ip.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }, { Action: "DELETE", ResourceRecordSet: { AliasTarget: { DNSName: "api-private-shared-ip-exa-ohatqj.elb.cloudmock.com", EvaluateTargetHealth: false, HostedZoneId: "FAKEZONE-CLOUDMOCK-ELB" }, Name: "api.private-shared-ip.example.com", Type: "A" } } ] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/kops-controller.internal.private-shared-ip.example.com. ok I0407 02:00:51.750090 6053 natgateway.go:186] DeleteNatGateway: { NatGatewayId: "nat-1" } autoscaling-config:lt-2 ok nat-gateway:nat-1 ok I0407 02:00:51.750121 6053 loadbalancers.go:208] DeleteLoadBalancer { LoadBalancerArn: "arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1" } load-balancer:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:loadbalancer/net/bastion-private-shared-ip-eepmph/1 ok autoscaling-group:nodes.private-shared-ip.example.com ok I0407 02:00:51.750193 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-4"] } target-group:arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/bastion-private-shared-ip-eepmph/4 ok iam-instance-profile:bastions.private-shared-ip.example.com ok autoscaling-group:master-us-test-1a.masters.private-shared-ip.example.com ok I0407 02:00:51.750284 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-4", IpPermissions: [ { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 22, IpProtocol: "tcp", ToPort: 22, UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-3" }] }, { FromPort: 443, IpProtocol: "tcp", ToPort: 443, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-4" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-3" }] } ] } W0407 02:00:51.750541 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:51.750569 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-4" } security-group:sg-4 ok autoscaling-config:lt-1 ok autoscaling-config:lt-3 ok I0407 02:00:51.750623 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:51.750677 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 22 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }, { FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "172.20.4.0/22" }], ToPort: 4 } ] } W0407 02:00:51.750825 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:51.750859 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:51.750920 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } volume:vol-2 ok I0407 02:00:51.751016 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:51.751149 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "bastions.private-shared-ip.example.com" } I0407 02:00:51.751172 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:51.751240 6053 iamrole.go:180] ListAttachedRolePolicies: bastions.private-shared-ip.example.com I0407 02:00:51.751263 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "bastions.private-shared-ip.example.com", RoleName: "bastions.private-shared-ip.example.com" } I0407 02:00:51.751264 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-2" } subnet:subnet-2 ok I0407 02:00:51.751308 6053 iamrole.go:137] DeleteRole: { RoleName: "bastions.private-shared-ip.example.com" } iam-role:bastions.private-shared-ip.example.com ok I0407 02:00:51.751315 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:51.751360 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.private-shared-ip.example.com" } I0407 02:00:51.751414 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.private-shared-ip.example.com I0407 02:00:51.751429 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.private-shared-ip.example.com", RoleName: "nodes.private-shared-ip.example.com" } I0407 02:00:51.751367 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 },{ FromPort: 3, IpProtocol: "icmp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 4 }] } I0407 02:00:51.751458 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.private-shared-ip.example.com" } iam-role:nodes.private-shared-ip.example.com ok W0407 02:00:51.751475 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:51.751494 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:51.751493 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.private-shared-ip.example.com" } I0407 02:00:51.751532 6053 iamrole.go:180] ListAttachedRolePolicies: masters.private-shared-ip.example.com I0407 02:00:51.751547 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.private-shared-ip.example.com", RoleName: "masters.private-shared-ip.example.com" } I0407 02:00:51.751579 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.private-shared-ip.example.com" } iam-role:masters.private-shared-ip.example.com ok I0407 02:00:51.751651 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-2" } route-table:rtb-2 ok I0407 02:00:51.751745 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok --- PASS: TestLifecyclePrivateSharedIP (3.03s) === RUN TestLifecycleManyAddons I0407 02:00:51.752225 6053 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 02:00:51.752362 6053 internetgateways.go:66] CreateInternetGateway: { } I0407 02:00:51.752399 6053 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 02:00:51.752441 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 02:00:51.752481 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 02:00:51.752533 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 02:00:51.752576 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 02:00:51.752606 6053 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 02:00:51.752645 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 02:00:51.752675 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } lifecycle_integration_test.go:187: running lifecycle test for cluster minimal.example.com I0407 02:00:51.778647 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:51.782177 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:51.782265 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.089060 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:53.924124 6053 iamrole.go:89] ListRoles: { } I0407 02:00:53.925209 6053 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0407 02:00:53.925480 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:53.925654 6053 keypairs.go:50] ImportKeyPair: { KeyName: "kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57", PublicKeyMaterial: len 212, TagSpecifications: [{ ResourceType: "key-pair", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.925804 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.925966 6053 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "minimal.example.com" }] }] } I0407 02:00:53.926031 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.926321 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsSupport: { Value: true }, VpcId: "vpc-1" } I0407 02:00:53.926396 6053 vpcs.go:190] ModifyVpcAttribute: { EnableDnsHostnames: { Value: true }, VpcId: "vpc-1" } I0407 02:00:53.926811 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:53.926873 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:53.926881 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:53.926919 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.927146 6053 dhcpoptions.go:125] CreateDhcpOptions: { DhcpConfigurations: [{ Key: "domain-name-servers", Values: ["AmazonProvidedDNS"] },{ Key: "domain-name", Values: ["us-test-1.compute.internal"] }], TagSpecifications: [{ ResourceType: "dhcp-options", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.927285 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:53.927343 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-events.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "k8s.io/etcd/events", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:53.927419 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } I0407 02:00:53.927484 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:53.927531 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] } I0407 02:00:53.927843 6053 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } I0407 02:00:53.927932 6053 iaminstanceprofile.go:100] CreateInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "masters.minimal.example.com" }] } I0407 02:00:53.928444 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.929483 6053 volumes.go:33] CreateVolume: { AvailabilityZone: "us-test-1a", Encrypted: false, Iops: 3000, Size: 20, TagSpecifications: [{ ResourceType: "volume", Tags: [ { Key: "k8s.io/etcd/main", Value: "us-test-1a/us-test-1a" }, { Key: "k8s.io/role/control-plane", Value: "1" }, { Key: "k8s.io/role/master", Value: "1" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "Name", Value: "us-test-1a.etcd-main.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" } ] }], Throughput: 125, VolumeType: "gp3" } I0407 02:00:53.929674 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:53.933269 6053 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0407 02:00:53.933574 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0407 02:00:53.933594 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.933819 6053 subnets.go:110] CreateSubnet: { AvailabilityZone: "us-test-1a", CidrBlock: "172.20.32.0/19", TagSpecifications: [{ ResourceType: "subnet", Tags: [ { Key: "Name", Value: "us-test-1a.minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "SubnetType", Value: "Public" }, { Key: "kubernetes.io/role/elb", Value: "1" }, { Key: "kubernetes.io/role/internal-elb", Value: "1" } ] }], VpcId: "vpc-1" } I0407 02:00:53.933855 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0407 02:00:53.934091 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0407 02:00:53.934116 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for masters", GroupName: "masters.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }], VpcId: "vpc-1" } I0407 02:00:53.934766 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"autoscaling:DescribeAutoScalingInstances\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeTags\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:GenerateRandom\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 02:00:53.934898 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:53.934941 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 02:00:53.934968 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:53.934992 6053 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 02:00:53.935007 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:53.935133 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0407 02:00:53.935297 6053 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 02:00:53.935430 6053 securitygroups.go:40] CreateSecurityGroup: { Description: "Security group for nodes", GroupName: "nodes.minimal.example.com", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "nodes.minimal.example.com" }] }], VpcId: "vpc-1" } I0407 02:00:53.935604 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:53.935694 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:53.935966 6053 dhcpoptions.go:91] AssociateDhcpOptions: { DhcpOptionsId: "dopt-1", VpcId: "vpc-1" } I0407 02:00:53.936023 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.936128 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:53.936246 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:53.936293 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] },{ Name: "tag:kubernetes.io/kops/role", Values: ["public"] }] } I0407 02:00:53.936414 6053 routetable.go:106] CreateRouteTable: { TagSpecifications: [{ ResourceType: "route-table", Tags: [ { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" }, { Key: "Name", Value: "minimal.example.com" } ] }], VpcId: "vpc-1" } I0407 02:00:53.936388 6053 internetgateways.go:66] CreateInternetGateway: { TagSpecifications: [{ ResourceType: "internet-gateway", Tags: [{ Key: "Name", Value: "minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.936555 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:53.936641 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:53.936733 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:53.936821 6053 tags.go:42] CreateTags { Resources: ["rtb-1"], Tags: [ { Key: "Name", Value: "minimal.example.com" }, { Key: "KubernetesCluster", Value: "minimal.example.com" }, { Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }, { Key: "kubernetes.io/kops/role", Value: "public" } ] } I0407 02:00:53.936920 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:53.937192 6053 iamrolepolicy.go:71] PutRolePolicy: { PolicyDocument: "{\n \"Statement\": [\n {\n \"Action\": \"ec2:AttachVolume\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\",\n \"aws:ResourceTag/k8s.io/role/master\": \"1\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": [\n \"s3:Get*\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-read-bucket/clusters.example.com/minimal.example.com/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/main/*\"\n },\n {\n \"Action\": [\n \"s3:GetObject\",\n \"s3:DeleteObject\",\n \"s3:DeleteObjectVersion\",\n \"s3:PutObject\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:s3:::placeholder-write-bucket/clusters.example.com/minimal.example.com/backups/etcd/events/*\"\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-read-bucket\"\n ]\n },\n {\n \"Action\": [\n \"s3:GetBucketLocation\",\n \"s3:GetEncryptionConfiguration\",\n \"s3:ListBucket\",\n \"s3:ListBucketVersions\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:s3:::placeholder-write-bucket\"\n ]\n },\n {\n \"Action\": [\n \"route53:ChangeResourceRecordSets\",\n \"route53:ListResourceRecordSets\",\n \"route53:GetHostedZone\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::hostedzone/Z1AFAKE1ZON3YO\"\n ]\n },\n {\n \"Action\": [\n \"route53:GetChange\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:route53:::change/*\"\n ]\n },\n {\n \"Action\": [\n \"route53:ListHostedZones\",\n \"route53:ListTagsForResource\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateVolume\",\n \"CreateSnapshot\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:volume/*\",\n \"arn:aws-test:ec2:*:*:snapshot/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": \"ec2:CreateTags\",\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\",\n \"ec2:CreateAction\": [\n \"CreateSecurityGroup\"\n ]\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\",\n \"ec2:DeleteTags\"\n ],\n \"Condition\": {\n \"Null\": {\n \"aws:RequestTag/KubernetesCluster\": \"true\"\n },\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:security-group/*\"\n ]\n },\n {\n \"Action\": [\n \"ec2:CreateTags\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\n \"arn:aws-test:ec2:*:*:network-interface/*\"\n ]\n },\n {\n \"Action\": [\n \"acm:DescribeCertificate\",\n \"acm:ListCertificates\",\n \"autoscaling:DescribeAutoScalingGroups\",\n \"autoscaling:DescribeAutoScalingInstances\",\n \"autoscaling:DescribeLaunchConfigurations\",\n \"autoscaling:DescribeScalingActivities\",\n \"autoscaling:DescribeTags\",\n \"cognito-idp:DescribeUserPoolClient\",\n \"ec2:AssignPrivateIpAddresses\",\n \"ec2:AttachNetworkInterface\",\n \"ec2:CreateNetworkInterface\",\n \"ec2:CreateSnapshot\",\n \"ec2:DeleteNetworkInterface\",\n \"ec2:DescribeAccountAttributes\",\n \"ec2:DescribeAvailabilityZones\",\n \"ec2:DescribeInstanceTypes\",\n \"ec2:DescribeInstances\",\n \"ec2:DescribeInternetGateways\",\n \"ec2:DescribeLaunchTemplateVersions\",\n \"ec2:DescribeNetworkInterfaces\",\n \"ec2:DescribeRegions\",\n \"ec2:DescribeRouteTables\",\n \"ec2:DescribeSecurityGroups\",\n \"ec2:DescribeSnapshots\",\n \"ec2:DescribeSubnets\",\n \"ec2:DescribeTags\",\n \"ec2:DescribeVolumes\",\n \"ec2:DescribeVolumesModifications\",\n \"ec2:DescribeVpcPeeringConnections\",\n \"ec2:DescribeVpcs\",\n \"ec2:DetachNetworkInterface\",\n \"ec2:ModifyNetworkInterfaceAttribute\",\n \"ec2:UnassignPrivateIpAddresses\",\n \"elasticloadbalancing:DescribeListenerCertificates\",\n \"elasticloadbalancing:DescribeListeners\",\n \"elasticloadbalancing:DescribeLoadBalancerAttributes\",\n \"elasticloadbalancing:DescribeLoadBalancerPolicies\",\n \"elasticloadbalancing:DescribeLoadBalancers\",\n \"elasticloadbalancing:DescribeRules\",\n \"elasticloadbalancing:DescribeTags\",\n \"elasticloadbalancing:DescribeTargetGroupAttributes\",\n \"elasticloadbalancing:DescribeTargetGroups\",\n \"elasticloadbalancing:DescribeTargetHealth\",\n \"iam:GetServerCertificate\",\n \"iam:ListServerCertificates\",\n \"kms:DescribeKey\",\n \"kms:GenerateRandom\",\n \"sqs:DeleteMessage\",\n \"sqs:ReceiveMessage\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"autoscaling:CompleteLifecycleAction\",\n \"autoscaling:SetDesiredCapacity\",\n \"autoscaling:TerminateInstanceInAutoScalingGroup\",\n \"ec2:AttachVolume\",\n \"ec2:AuthorizeSecurityGroupIngress\",\n \"ec2:DeleteSecurityGroup\",\n \"ec2:DeleteSnapshot\",\n \"ec2:DeleteVolume\",\n \"ec2:DetachVolume\",\n \"ec2:ModifyInstanceAttribute\",\n \"ec2:ModifyVolume\",\n \"ec2:RevokeSecurityGroupIngress\",\n \"elasticloadbalancing:AddListenerCertificates\",\n \"elasticloadbalancing:AddTags\",\n \"elasticloadbalancing:ApplySecurityGroupsToLoadBalancer\",\n \"elasticloadbalancing:AttachLoadBalancerToSubnets\",\n \"elasticloadbalancing:ConfigureHealthCheck\",\n \"elasticloadbalancing:CreateLoadBalancerListeners\",\n \"elasticloadbalancing:CreateLoadBalancerPolicy\",\n \"elasticloadbalancing:DeleteListener\",\n \"elasticloadbalancing:DeleteLoadBalancer\",\n \"elasticloadbalancing:DeleteLoadBalancerListeners\",\n \"elasticloadbalancing:DeleteRule\",\n \"elasticloadbalancing:DeleteTargetGroup\",\n \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n \"elasticloadbalancing:DeregisterTargets\",\n \"elasticloadbalancing:DetachLoadBalancerFromSubnets\",\n \"elasticloadbalancing:ModifyListener\",\n \"elasticloadbalancing:ModifyLoadBalancerAttributes\",\n \"elasticloadbalancing:ModifyRule\",\n \"elasticloadbalancing:ModifyTargetGroup\",\n \"elasticloadbalancing:ModifyTargetGroupAttributes\",\n \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n \"elasticloadbalancing:RegisterTargets\",\n \"elasticloadbalancing:RemoveListenerCertificates\",\n \"elasticloadbalancing:RemoveTags\",\n \"elasticloadbalancing:SetIpAddressType\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesForBackendServer\",\n \"elasticloadbalancing:SetLoadBalancerPoliciesOfListener\",\n \"elasticloadbalancing:SetSecurityGroups\",\n \"elasticloadbalancing:SetSubnets\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:ResourceTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": [\n \"ec2:CreateSecurityGroup\",\n \"ec2:CreateSnapshot\",\n \"ec2:CreateVolume\",\n \"elasticloadbalancing:CreateListener\",\n \"elasticloadbalancing:CreateLoadBalancer\",\n \"elasticloadbalancing:CreateRule\",\n \"elasticloadbalancing:CreateTargetGroup\"\n ],\n \"Condition\": {\n \"StringEquals\": {\n \"aws:RequestTag/KubernetesCluster\": \"minimal.example.com\"\n }\n },\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n },\n {\n \"Action\": \"ec2:CreateSecurityGroup\",\n \"Effect\": \"Allow\",\n \"Resource\": \"arn:aws-test:ec2:*:*:vpc/*\"\n }\n ],\n \"Version\": \"2012-10-17\"\n}", PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 02:00:53.940092 6053 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0407 02:00:53.940350 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:53.940451 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:53.940611 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 02:00:53.940868 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-4003to65535-masters.minimal.example.com" }] }] } I0407 02:00:53.941020 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 02:00:53.941223 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.941369 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.941617 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 02:00:53.941784 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:53.941869 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-443to443-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 02:00:53.942013 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "association.subnet-id", Values: ["subnet-1"] }] } I0407 02:00:53.942065 6053 routetable.go:149] CreateRoute: { DestinationIpv6CidrBlock: "::/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:53.942111 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-udp-1to65535-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.942246 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-0.0.0.0/0-ingress-tcp-22to22-nodes.minimal.example.com" }] }] } I0407 02:00:53.942402 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", IpRanges: [{ CidrIp: "0.0.0.0/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-0.0.0.0/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.942533 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.942677 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.942813 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.943004 6053 securitygroups.go:246] AuthorizeSecurityGroupEgress: { GroupId: "sg-1", IpPermissions: [{ IpProtocol: "-1", Ipv6Ranges: [{ CidrIpv6: "::/0" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-egress-all-0to0-::/0" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.943140 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.943240 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.943349 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-masters.minimal.example.com-ingress-all-0to0-nodes.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.943564 6053 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-1", SubnetId: "subnet-1" } I0407 02:00:53.943615 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" },{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-1to2379-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" }] }] } I0407 02:00:53.943773 6053 securitygroups.go:357] AuthorizeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [{ FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] }], TagSpecifications: [{ ResourceType: "security-group-rule", Tags: [{ Key: "Name", Value: "from-nodes.minimal.example.com-ingress-tcp-2382to4000-masters.minimal.example.com" },{ Key: "KubernetesCluster", Value: "minimal.example.com" },{ Key: "kubernetes.io/cluster/minimal.example.com", Value: "owned" }] }] } I0407 02:00:53.943912 6053 routetable.go:149] CreateRoute: { DestinationCidrBlock: "0.0.0.0/0", GatewayId: "igw-2", RouteTableId: "rtb-1" } I0407 02:00:53.944067 6053 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0407 02:00:53.944383 6053 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0407 02:00:53.944764 6053 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0407 02:00:53.944824 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:53.944867 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:53.944935 6053 dns.go:235] Pre-creating DNS records I0407 02:00:53.944966 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "CREATE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "CREATE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:53.951083 6053 zones.go:93] ListHostedZonesPages { } ********************************************************************************* A new kops version is available: 1.26.5 Upgrading is recommended More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_kops.md#1.26.5 ********************************************************************************* ********************************************************************************* A new kubernetes version is available: 1.26.8 Upgrading is recommended (try kops upgrade cluster) More information: https://github.com/kubernetes/kops/blob/master/permalinks/upgrade_k8s.md#1.26.8 ********************************************************************************* I0407 02:00:53.954584 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:53.954672 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:55.290138 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:56.079514 6053 iamrole.go:89] ListRoles: { } I0407 02:00:56.081167 6053 executor.go:111] Tasks: 0 done / 108 total; 51 can run I0407 02:00:56.081403 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.081586 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 02:00:56.081626 6053 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 02:00:56.081685 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:56.082852 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.082985 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-events.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.083212 6053 keypairs.go:95] DescribeKeyPairs: { KeyNames: ["kubernetes.minimal.example.com-c4:a6:ed:9a:a8:89:b9:e2:c3:9c:d6:63:eb:9c:71:57"] } I0407 02:00:56.083378 6053 zones.go:40] GetHostedZone { Id: "Z1AFAKE1ZON3YO" } I0407 02:00:56.083811 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.etcd-main.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.085632 6053 executor.go:111] Tasks: 51 done / 108 total; 23 can run I0407 02:00:56.085930 6053 iamrole.go:161] ListAttachedRolePolicies: nodes.minimal.example.com I0407 02:00:56.085905 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["us-test-1a.minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.086054 6053 iamrole.go:161] ListAttachedRolePolicies: masters.minimal.example.com I0407 02:00:56.086064 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:56.086166 6053 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 02:00:56.086213 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] },{ Name: "tag:Name", Values: ["minimal.example.com"] }] } I0407 02:00:56.086338 6053 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 02:00:56.086431 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:Name", Values: ["masters.minimal.example.com"] }, { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["masters.minimal.example.com"] } ] } I0407 02:00:56.086617 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:56.086692 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [ { Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }, { Name: "tag:Name", Values: ["nodes.minimal.example.com"] }, { Name: "vpc-id", Values: ["vpc-1"] }, { Name: "group-name", Values: ["nodes.minimal.example.com"] } ] } I0407 02:00:56.086991 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:56.087080 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:Name", Values: ["minimal.example.com"] },{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.091513 6053 executor.go:111] Tasks: 74 done / 108 total; 26 can run I0407 02:00:56.091802 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:56.091923 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:56.092153 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:56.092338 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:56.092478 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:56.092553 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:56.092728 6053 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: ["images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20220404"] }], Owners: ["099720109477"] } I0407 02:00:56.093214 6053 executor.go:111] Tasks: 100 done / 108 total; 2 can run I0407 02:00:56.093512 6053 executor.go:111] Tasks: 102 done / 108 total; 6 can run I0407 02:00:56.093759 6053 executor.go:111] Tasks: 108 done / 108 total; 0 can run I0407 02:00:56.096688 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["ami-12345678"] }] } I0407 02:00:56.096756 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["dopt-1"] }] } I0407 02:00:56.096798 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eigw-1"] }] } I0407 02:00:56.096833 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-12345678"] }] } I0407 02:00:56.096864 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-b2345678"] }] } I0407 02:00:56.096895 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-1"] }] } I0407 02:00:56.096927 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["igw-2"] }] } I0407 02:00:56.096962 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["key-1"] }] } I0407 02:00:56.096998 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-1"] }] } I0407 02:00:56.097039 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["lt-2"] }] } I0407 02:00:56.097073 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-a2345678"] }] } I0407 02:00:56.097103 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["nat-b2345678"] }] } I0407 02:00:56.097134 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-1"] }] } I0407 02:00:56.097168 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["rtb-12345678"] }] } I0407 02:00:56.097197 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 02:00:56.097231 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-2"] }] } I0407 02:00:56.097268 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 02:00:56.097304 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-12345678"] }] } I0407 02:00:56.097337 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-abcdef"] }] } I0407 02:00:56.097367 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-b2345678"] }] } I0407 02:00:56.097397 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-1"] }] } I0407 02:00:56.097432 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vol-2"] }] } I0407 02:00:56.097467 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 02:00:56.097502 6053 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-12345678"] }] } I0407 02:00:56.099132 6053 delete_cluster.go:128] Looking for cloud resources to delete W0407 02:00:56.099198 6053 instances.go:27] MockEc2::DescribeInstances is stub-implemented I0407 02:00:56.099220 6053 keypairs.go:95] DescribeKeyPairs: { } I0407 02:00:56.099265 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099315 6053 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0407 02:00:56.099371 6053 volumes.go:128] DescribeVolumes: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099430 6053 dhcpoptions.go:33] DescribeDhcpOptions: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099480 6053 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099532 6053 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099577 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099617 6053 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } I0407 02:00:56.099666 6053 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099717 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["minimal.example.com"] }] } I0407 02:00:56.099755 6053 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/minimal.example.com"] }] } W0407 02:00:56.099801 6053 tags.go:48] unknown cluster tag on vpc:vpc-12345678: "kubernetes.io/cluster/minimal.example.com"="" W0407 02:00:56.099835 6053 api.go:53] PageSize not implemented I0407 02:00:56.099860 6053 loadbalancers.go:32] DescribeLoadBalancers v2 { PageSize: 20 } W0407 02:00:56.099889 6053 loadbalancers.go:35] PageSize not implemented I0407 02:00:56.099908 6053 targetgroups.go:32] DescribeTargetGroups { PageSize: 20 } W0407 02:00:56.099934 6053 targetgroups.go:35] PageSize not implemented I0407 02:00:56.099954 6053 tags.go:64] DescribeTags v2 { ResourceArns: ["arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-1/1","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-2/2","arn:aws-test:elasticloadbalancing:us-test-1:000000000000:targetgroup/my-external-tg-3/3"] } I0407 02:00:56.100005 6053 iaminstanceprofile.go:193] ListInstanceProfiles: { } I0407 02:00:56.100048 6053 iamrole.go:89] ListRoles: { } I0407 02:00:56.100093 6053 zones.go:93] ListHostedZonesPages { } I0407 02:00:56.100123 6053 records.go:48] ListResourceRecordSetsPages { HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } I0407 02:00:56.100165 6053 internetgateways.go:101] DescribeInternetGateways: { } I0407 02:00:56.100212 6053 routetable.go:53] DescribeRouteTables: { } I0407 02:00:56.100247 6053 routetable.go:53] DescribeRouteTables: { RouteTableIds: ["rtb-1"] } I0407 02:00:56.100653 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-2"] } I0407 02:00:56.100714 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 02:00:56.100800 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "nodes.minimal.example.com" } iam-instance-profile:nodes.minimal.example.com ok I0407 02:00:56.100716 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-2", IpPermissions: [{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] },{ FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 },{ IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }] } W0407 02:00:56.100854 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions autoscaling-group:nodes.minimal.example.com ok autoscaling-group:master-us-test-1a.masters.minimal.example.com ok I0407 02:00:56.100884 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-2" } I0407 02:00:56.100889 6053 iaminstanceprofile.go:156] RemoveRoleFromInstanceProfile: { InstanceProfileName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } volume:vol-2 ok autoscaling-config:lt-1 ok I0407 02:00:56.100941 6053 iaminstanceprofile.go:241] DeleteInstanceProfile: { InstanceProfileName: "masters.minimal.example.com" } iam-instance-profile:masters.minimal.example.com ok I0407 02:00:56.100950 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-2" } security-group:sg-2 ok I0407 02:00:56.100795 6053 records.go:89] ChangeResourceRecordSets { ChangeBatch: { Changes: [{ Action: "DELETE", ResourceRecordSet: { Name: "api.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "api.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } },{ Action: "DELETE", ResourceRecordSet: { Name: "kops-controller.internal.minimal.example.com.", ResourceRecords: [{ Value: "203.0.113.123" }], TTL: 10, Type: "A" } }] }, HostedZoneId: "/hostedzone/Z1AFAKE1ZON3YO" } route53-record:Z1AFAKE1ZON3YO/A/api.minimal.example.com. ok I0407 02:00:56.100988 6053 volumes.go:203] DeleteVolume: { VolumeId: "vol-1" } volume:vol-1 ok I0407 02:00:56.101047 6053 securitygroups.go:115] DescribeSecurityGroups: { GroupIds: ["sg-1"] } I0407 02:00:56.101115 6053 securitygroups.go:210] RevokeSecurityGroupIngress: { GroupId: "sg-1", IpPermissions: [ { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-1" }] }, { FromPort: 4003, IpProtocol: "tcp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { IpProtocol: "-1", UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 22, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 22 }, { FromPort: 443, IpProtocol: "tcp", IpRanges: [{ CidrIp: "0.0.0.0/0" }], ToPort: 443 }, { FromPort: 1, IpProtocol: "udp", ToPort: 65535, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 1, IpProtocol: "tcp", ToPort: 2379, UserIdGroupPairs: [{ GroupId: "sg-2" }] }, { FromPort: 2382, IpProtocol: "tcp", ToPort: 4000, UserIdGroupPairs: [{ GroupId: "sg-2" }] } ] } W0407 02:00:56.101336 6053 securitygroups.go:228] RevokeSecurityGroupIngress mock not implemented - does not actually revoke permissions I0407 02:00:56.101360 6053 securitygroups.go:79] DeleteSecurityGroup: { GroupId: "sg-1" } security-group:sg-1 ok I0407 02:00:56.101399 6053 keypairs.go:154] DeleteKeyPair: { KeyPairId: "key-1" } keypair:key-1 ok autoscaling-config:lt-2 ok I0407 02:00:56.101480 6053 internetgateways.go:101] DescribeInternetGateways: { InternetGatewayIds: ["igw-2"] } I0407 02:00:56.101537 6053 internetgateways.go:227] DeleteInternetGateway: { InternetGatewayId: "igw-2" } internet-gateway:igw-2 ok I0407 02:00:56.101611 6053 subnets.go:238] DeleteSubnet: { SubnetId: "subnet-1" } subnet:subnet-1 ok I0407 02:00:56.101672 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "nodes.minimal.example.com" } I0407 02:00:56.101780 6053 iamrole.go:180] ListAttachedRolePolicies: nodes.minimal.example.com I0407 02:00:56.101801 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "nodes.minimal.example.com", RoleName: "nodes.minimal.example.com" } I0407 02:00:56.101837 6053 iamrole.go:137] DeleteRole: { RoleName: "nodes.minimal.example.com" } iam-role:nodes.minimal.example.com ok I0407 02:00:56.101874 6053 iamrolepolicy.go:108] ListRolePolicies: { RoleName: "masters.minimal.example.com" } I0407 02:00:56.101918 6053 iamrole.go:180] ListAttachedRolePolicies: masters.minimal.example.com I0407 02:00:56.101932 6053 iamrolepolicy.go:156] DeleteRolePolicy: { PolicyName: "masters.minimal.example.com", RoleName: "masters.minimal.example.com" } I0407 02:00:56.101961 6053 iamrole.go:137] DeleteRole: { RoleName: "masters.minimal.example.com" } iam-role:masters.minimal.example.com ok I0407 02:00:56.102032 6053 routetable.go:188] DeleteRouteTable: { RouteTableId: "rtb-1" } route-table:rtb-1 ok I0407 02:00:56.102126 6053 vpcs.go:222] DeleteVpc: { VpcId: "vpc-1" } vpc:vpc-1 ok I0407 02:00:56.102202 6053 dhcpoptions.go:173] DeleteDhcpOptions: { DhcpOptionsId: "dopt-1" } dhcp-options:dopt-1 ok --- PASS: TestLifecycleManyAddons (4.35s) === RUN TestGetFilters --- PASS: TestGetFilters (0.00s) === RUN TestGetInstanceSelectorOpts --- PASS: TestGetInstanceSelectorOpts (0.00s) === RUN TestValidateAllPrivateOrPublicSubnets --- PASS: TestValidateAllPrivateOrPublicSubnets (0.00s) === RUN TestValidateUserSubnetsWithClusterSubnets --- PASS: TestValidateUserSubnetsWithClusterSubnets (0.00s) === RUN TestCreateInstanceGroup --- PASS: TestCreateInstanceGroup (0.00s) === RUN TestDecorateWithInstanceGroupSpecs --- PASS: TestDecorateWithInstanceGroupSpecs (0.00s) === RUN TestDecorateWithMixedInstancesPolicy --- PASS: TestDecorateWithMixedInstancesPolicy (0.00s) === RUN TestDecorateWithClusterAutoscalerLabels --- PASS: TestDecorateWithClusterAutoscalerLabels (0.00s) === RUN TestNewTemplateContext --- PASS: TestNewTemplateContext (0.00s) PASS ok k8s.io/kops/cmd/kops 211.897s === RUN TestBuildProxyRequest === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/livez === RUN TestBuildProxyRequest/http://127.0.0.1:3990/healthz === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ready === RUN TestBuildProxyRequest/http://127.0.0.1:3990/ === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz? === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose === RUN TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude --- PASS: TestBuildProxyRequest (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/livez (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/healthz (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ready (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/ (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz/foo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyzfoo (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz? (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?foo=bar (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&exclude=2 (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude=1&verbose (0.00s) --- PASS: TestBuildProxyRequest/http://127.0.0.1:3990/readyz?exclude (0.00s) PASS ok k8s.io/kops/cmd/kube-apiserver-healthcheck 0.006s === RUN TestAliasForNodesInRole --- PASS: TestAliasForNodesInRole (0.00s) === RUN TestEnsureDotSuffix --- PASS: TestEnsureDotSuffix (0.00s) === RUN TestParseZoneSpec --- PASS: TestParseZoneSpec (0.00s) === RUN TestParseZoneRules I0407 01:57:24.228596 6057 zonespec.go:75] No rules specified, will permit management of all zones --- PASS: TestParseZoneRules (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/dns 0.005s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) PASS ok k8s.io/kops/dns-controller/pkg/util 0.005s === RUN TestPodController I0407 01:57:24.262592 6059 pod.go:59] starting pod controller I0407 01:57:24.262844 6059 stoppable.go:62] shutting down controller I0407 01:57:24.262924 6059 pod.go:107] Got stop signal --- PASS: TestPodController (0.00s) I0407 01:57:24.262955 6059 pod.go:65] shutting down pod controller PASS ok k8s.io/kops/dns-controller/pkg/watchers 0.047s === RUN TestEquivalent --- PASS: TestEquivalent (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider 0.005s Parsing flags. Getting new test interface. Running tests... === RUN TestZonesList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000103470} route53_test.go:93: Got zone list: [0xc0001034a0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc0001040e8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0001035d0} route53_test.go:93: Got zone list: [0xc000103600] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc000104100} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess route53_test.go:79: Got zones {0xc000103700} route53_test.go:170: Successfully added managed DNS zone: &{0xc0003c9230 0xc000104120} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0001038c0} route53_test.go:93: Got zone list: [0xc0001038f0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc000104140} route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.01s) === RUN TestResourceRecordSetsAddSuccess route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000034170} route53_test.go:93: Got zone list: [0xc0000341a0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c020} route53_test.go:187: Successfully added resource record set: {0xc0000e4000 0xc00009c040} --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000034480} route53_test.go:93: Got zone list: [0xc0000344b0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c0d0} route53_test.go:199: Successfully added resource record set: {0xc0000e41b0 0xc00009c0f0} route53_test.go:118: Got 1 recordsets: [0xc000034650] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000347e0} route53_test.go:93: Got zone list: [0xc000034810] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c190} route53_test.go:221: Successfully added resource record set: {0xc0000e4360 0xc00009c1b0} route53_test.go:228: Correctly failed to add duplicate resource record {0xc0000e4360 0xc00009c1b0}: attempt to create duplicate rrset www11.example.com::A --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000034bd0} route53_test.go:93: Got zone list: [0xc000034c00] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c270} route53_test.go:246: Successfully removed resource set {0xc0000e45a0 0xc00009c290} after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000034ee0} route53_test.go:93: Got zone list: [0xc000034f10] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c320} route53_test.go:264: Successfully removed resource set {0xc0000e4750 0xc00009c340} after adding route53_test.go:118: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035220} route53_test.go:93: Got zone list: [0xc000035250] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c3d8} commontests.go:192: Successfully added resource record set: {0xc0000e4900 0xc00009c3f8} commontests.go:45: Correctly replaced resource record {0xc0000e4900 0xc00009c3f8} -> {0xc0000e4a20 0xc00009c448} commontests.go:142: Got 1 recordsets: [0xc000035560] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035790} route53_test.go:93: Got zone list: [0xc0000357c0] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c500} commontests.go:192: Successfully added resource record set: {0xc0000e4cf0 0xc00009c520} commontests.go:70: Correctly replaced resource record {0xc0000e4cf0 0xc00009c520} -> {0xc0000e4e10 0xc00009c570} commontests.go:142: Got 1 recordsets: [0xc000035ad0] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc000035d50} route53_test.go:93: Got zone list: [0xc000035d80] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c638} commontests.go:192: Successfully added resource record set: {0xc0000e50e0 0xc00009c658} commontests.go:142: Got 2 recordsets: [0xc0000f4070 0xc0000f4090] commontests.go:142: Got 2 recordsets: [0xc0000f4100 0xc0000f4120] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract route53_test.go:87: Getting zones route53_test.go:79: Got zones {0xc0000f4320} route53_test.go:93: Got zone list: [0xc0000f4350] route53_test.go:98: Got at least 1 zone in list:&{0xc0003c8ff0 0xc00009c760} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/aws/route53 0.024s === RUN TestZonesList --- PASS: TestZonesList (0.00s) === RUN TestAdd --- PASS: TestAdd (0.00s) === RUN TestRemove --- PASS: TestRemove (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/do 0.006s === RUN TestZonesList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc0004526c0} clouddns_test.go:71: Got zone list: [0xc000322cd8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000322ca8} --- PASS: TestZonesList (0.00s) === RUN TestZonesID clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc0004527c0} clouddns_test.go:71: Got zone list: [0xc000322d98] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000322d68} --- PASS: TestZonesID (0.00s) === RUN TestZoneAddSuccess clouddns_test.go:131: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc0004528c0} clouddns_test.go:133: Got zones, making new Zone clouddns_test.go:149: Successfully added managed DNS zone: &{0xc000486f00 0xc000322e58} --- PASS: TestZoneAddSuccess (0.00s) === RUN TestResourceRecordSetsList clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452980} clouddns_test.go:71: Got zone list: [0xc000322f18] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000322ee8} clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsList (0.00s) === RUN TestResourceRecordSetsAddSuccess clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452aa0} clouddns_test.go:71: Got zone list: [0xc000323050] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323020} clouddns_test.go:165: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> --- PASS: TestResourceRecordSetsAddSuccess (0.00s) === RUN TestResourceRecordSetsAdditionVisible clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452be0} clouddns_test.go:71: Got zone list: [0xc0003231b8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323188} clouddns_test.go:176: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:96: Got 1 recordsets: [<(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>] --- PASS: TestResourceRecordSetsAdditionVisible (0.00s) === RUN TestResourceRecordSetsAddDuplicateFailure clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452d40} clouddns_test.go:71: Got zone list: [0xc0003233c8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323398} clouddns_test.go:198: Successfully added resource record set: <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> clouddns_test.go:205: Correctly failed to add duplicate resource record <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180>: attempt to insert duplicate rrset {www11.example.com [10.10.10.10 169.20.20.20] 180 A} --- PASS: TestResourceRecordSetsAddDuplicateFailure (0.00s) === RUN TestResourceRecordSetsRemove clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452ea0} clouddns_test.go:71: Got zone list: [0xc000323560] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323530} clouddns_test.go:223: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding --- PASS: TestResourceRecordSetsRemove (0.00s) === RUN TestResourceRecordSetsRemoveGone clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452fe0} clouddns_test.go:71: Got zone list: [0xc0003236c8] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323698} clouddns_test.go:241: Successfully removed resource set <(clouddns) "www11.example.com" type=A rrdatas=["10.10.10.10" "169.20.20.20"] ttl=180> after adding clouddns_test.go:96: Got 0 recordsets: [] --- PASS: TestResourceRecordSetsRemoveGone (0.00s) === RUN TestResourceRecordSetsReplace clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000453140} clouddns_test.go:71: Got zone list: [0xc000323890] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000323860} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:45: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] --- PASS: TestResourceRecordSetsReplace (0.00s) === RUN TestResourceRecordSetsReplaceAll clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452020} clouddns_test.go:71: Got zone list: [0xc000322048] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000322018} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:70: Correctly replaced resource record <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> -> <(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80> commontests.go:142: Got 1 recordsets: [<(clouddns) "beta.test.com" type=A rrdatas=["8.8.8.8"] ttl=80>] commontests.go:117: Did not Get recordset: alpha.test.com --- PASS: TestResourceRecordSetsReplaceAll (0.00s) === RUN TestResourceRecordSetsDifferentTypes clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc0004521a0} clouddns_test.go:71: Got zone list: [0xc000322420] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc0003223f0} commontests.go:192: Successfully added resource record set: <(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] commontests.go:142: Got 2 recordsets: [<(clouddns) "alpha.test.com" type=A rrdatas=["8.8.4.4"] ttl=40> <(clouddns) "alpha.test.com" type=AAAA rrdatas=["2001:4860:4860::8888"] ttl=80>] --- PASS: TestResourceRecordSetsDifferentTypes (0.00s) === RUN TestContract clouddns_test.go:66: Getting zones clouddns_test.go:58: Got zones {0xc000430918 0xc000452440} clouddns_test.go:71: Got zone list: [0xc000322c90] clouddns_test.go:76: Got at least 1 zone in list:&{0xc000486d80 0xc000322c60} --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/google/clouddns 0.079s === RUN TestContract --- PASS: TestContract (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/openstack/designate 0.035s === RUN TestZonesListValid --- PASS: TestZonesListValid (0.00s) === RUN TestZonesListShouldFail --- PASS: TestZonesListShouldFail (0.00s) === RUN TestAddValid --- PASS: TestAddValid (0.00s) === RUN TestAddShouldFail --- PASS: TestAddShouldFail (0.00s) === RUN TestRemoveValid --- PASS: TestRemoveValid (0.00s) === RUN TestRemoveShouldFail --- PASS: TestRemoveShouldFail (0.00s) === RUN TestNewZone --- PASS: TestNewZone (0.00s) === RUN TestNewResourceRecordSet --- PASS: TestNewResourceRecordSet (0.00s) === RUN TestResourceRecordChangeset --- PASS: TestResourceRecordChangeset (0.00s) PASS ok k8s.io/kops/dnsprovider/pkg/dnsprovider/providers/scaleway 0.011s === RUN TestBootstarapBuilder_Simple --- PASS: TestBootstarapBuilder_Simple (0.00s) PASS ok k8s.io/kops/nodeup/pkg/bootstrap 0.100s === RUN TestBuildAzure --- PASS: TestBuildAzure (0.00s) === RUN TestBuildAWSCustomNodeIPFamilies --- PASS: TestBuildAWSCustomNodeIPFamilies (0.00s) === RUN TestContainerdBuilder_Docker_19_03_13 I0407 01:57:25.448163 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.448318 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.448356 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.448393 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.448446 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.448496 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.448533 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.448552 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.448588 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.448630 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.456689 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_13 (0.01s) === RUN TestContainerdBuilder_Docker_19_03_14 I0407 01:57:25.460403 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.460500 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.460526 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.460554 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.460588 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.460628 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.460654 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.460685 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.460710 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.460727 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.461680 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdBuilder_Docker_19_03_14 (0.00s) === RUN TestContainerdBuilder_Simple I0407 01:57:25.464868 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.464930 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.464952 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.464975 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.464995 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.465031 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.465054 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.465089 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.465110 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.465127 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.466004 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.467510 6524 assetstore.go:108] Matching assets for "^bin/(containerd|ctr)": I0407 01:57:25.467529 6524 assetstore.go:111] bin/containerd I0407 01:57:25.467537 6524 assetstore.go:111] bin/containerd-shim I0407 01:57:25.467543 6524 assetstore.go:111] bin/containerd-shim-runc-v1 I0407 01:57:25.467549 6524 assetstore.go:111] bin/containerd-shim-runc-v2 I0407 01:57:25.467555 6524 assetstore.go:111] bin/containerd-stress I0407 01:57:25.467561 6524 assetstore.go:111] bin/ctr I0407 01:57:25.467598 6524 assetstore.go:108] Matching assets for "/runc\\.(amd64|arm64)$": I0407 01:57:25.467616 6524 assetstore.go:111] https://github.com/opencontainers/runc/releases/download/v1.1.0/runc.amd64 --- PASS: TestContainerdBuilder_Simple (0.01s) === RUN TestContainerdBuilder_Flatcar I0407 01:57:25.471149 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.471302 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.471371 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.471437 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.471501 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.471571 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.471636 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.471692 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.471767 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.471823 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.472903 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.474976 6524 containerd.go:60] Detected Flatcar; won't install containerd --- PASS: TestContainerdBuilder_Flatcar (0.00s) === RUN TestContainerdBuilder_SkipInstall I0407 01:57:25.475929 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.476022 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.476052 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.476080 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.476102 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.476132 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.476156 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.476173 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.476194 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.476210 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.477137 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.478620 6524 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestContainerdBuilder_SkipInstall (0.00s) === RUN TestContainerdBuilder_BuildFlags --- PASS: TestContainerdBuilder_BuildFlags (0.00s) === RUN TestContainerdConfig --- PASS: TestContainerdConfig (0.00s) === RUN TestAppendGPURuntimeContainerdConfig --- PASS: TestAppendGPURuntimeContainerdConfig (0.00s) === RUN TestDockerBuilder_19_03_11 I0407 01:57:25.480188 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.480313 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.480352 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.480396 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.480443 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.480503 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.480545 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.480581 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.480627 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.480667 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.482233 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.483782 6524 assetstore.go:108] Matching assets for "^docker/": I0407 01:57:25.483800 6524 assetstore.go:111] docker/containerd I0407 01:57:25.483808 6524 assetstore.go:111] docker/containerd-shim I0407 01:57:25.483814 6524 assetstore.go:111] docker/ctr I0407 01:57:25.483822 6524 assetstore.go:111] docker/docker I0407 01:57:25.483828 6524 assetstore.go:111] docker/docker-init I0407 01:57:25.483833 6524 assetstore.go:111] docker/docker-proxy I0407 01:57:25.483839 6524 assetstore.go:111] docker/dockerd I0407 01:57:25.483844 6524 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_19_03_11 (0.01s) === RUN TestDockerBuilder_LogFlags I0407 01:57:25.486703 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.486788 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.486816 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.486844 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.486869 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.486899 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.486927 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.486945 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.486972 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.487002 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.488004 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.489665 6524 assetstore.go:108] Matching assets for "^docker/": I0407 01:57:25.489688 6524 assetstore.go:111] docker/containerd I0407 01:57:25.489700 6524 assetstore.go:111] docker/containerd-shim I0407 01:57:25.489709 6524 assetstore.go:111] docker/ctr I0407 01:57:25.489719 6524 assetstore.go:111] docker/docker I0407 01:57:25.489728 6524 assetstore.go:111] docker/docker-init I0407 01:57:25.489737 6524 assetstore.go:111] docker/docker-proxy I0407 01:57:25.489747 6524 assetstore.go:111] docker/dockerd I0407 01:57:25.489756 6524 assetstore.go:111] docker/runc --- PASS: TestDockerBuilder_LogFlags (0.01s) === RUN TestDockerBuilder_SkipInstall I0407 01:57:25.494315 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.494434 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.494476 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.494527 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.494567 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.494617 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.494663 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.494699 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.494745 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.494778 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.496407 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.499008 6524 docker.go:63] SkipInstall is set to true; won't install Docker --- PASS: TestDockerBuilder_SkipInstall (0.00s) === RUN TestDockerBuilder_HealthCheck I0407 01:57:25.499235 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.499347 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.499385 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.499428 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.499471 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.499520 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.499564 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.499600 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.499642 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.499671 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.501163 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:25.503579 6524 assetstore.go:108] Matching assets for "^docker/": I0407 01:57:25.503605 6524 assetstore.go:111] docker/docker I0407 01:57:25.503618 6524 assetstore.go:111] docker/docker-containerd I0407 01:57:25.503629 6524 assetstore.go:111] docker/docker-containerd-ctr I0407 01:57:25.503639 6524 assetstore.go:111] docker/docker-containerd-shim I0407 01:57:25.503649 6524 assetstore.go:111] docker/docker-init I0407 01:57:25.503657 6524 assetstore.go:111] docker/docker-proxy I0407 01:57:25.503667 6524 assetstore.go:111] docker/docker-runc I0407 01:57:25.503676 6524 assetstore.go:111] docker/dockerd --- PASS: TestDockerBuilder_HealthCheck (0.01s) === RUN TestDockerBuilder_BuildFlags --- PASS: TestDockerBuilder_BuildFlags (0.00s) === RUN TestContainerdHooksBuilder I0407 01:57:25.510186 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.510386 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.510481 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.510581 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.510700 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.510766 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.510809 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.510843 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.510881 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.510908 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.514019 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestContainerdHooksBuilder (0.01s) === RUN TestDockerHooksBuilder I0407 01:57:25.516259 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.516349 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.516380 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.516423 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.516459 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.516504 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.516535 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.516565 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.516601 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.516627 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.518156 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestDockerHooksBuilder (0.00s) === RUN TestKopsControllerBuilder I0407 01:57:25.520251 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.520327 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.520354 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.520389 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.520428 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.520470 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.520499 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.520532 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.520569 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.520595 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.522061 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKopsControllerBuilder (0.01s) === RUN Test_KubeAPIServer_BuildFlags --- PASS: Test_KubeAPIServer_BuildFlags (0.00s) === RUN TestKubeAPIServerBuilder I0407 01:57:25.532068 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.532226 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.532274 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.532330 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.532379 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.532436 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.532484 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.532518 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.532563 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.532596 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.535583 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilder (0.02s) === RUN TestAuditConfigAPIServerBuilder I0407 01:57:25.550572 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.550708 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.550748 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.550791 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.550827 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.550875 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.550917 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.550948 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.550990 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.551018 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.554509 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestAuditConfigAPIServerBuilder (0.01s) === RUN TestOIDCConfigAPIServerBuilder I0407 01:57:25.564590 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.564677 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.564706 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.564736 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.564760 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.564792 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.564822 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.564841 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.564867 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.564885 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.566840 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestOIDCConfigAPIServerBuilder (0.01s) === RUN TestDeddicatedAPIServerBuilder I0407 01:57:25.576327 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.576445 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.576483 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.576528 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.576563 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.576607 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.576645 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.576675 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.576711 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.576736 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.579185 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestDeddicatedAPIServerBuilder (0.01s) === RUN TestWithoutEtcdEventsAPIServerBuilder I0407 01:57:25.586884 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.586963 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.586991 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.587023 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.587049 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.587079 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.587105 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.587126 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.587149 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.587166 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.588554 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestWithoutEtcdEventsAPIServerBuilder (0.01s) === RUN TestAwsIamAuthenticator I0407 01:57:25.594398 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.594472 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.594495 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.594520 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.594543 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.594568 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.594593 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.594614 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.594635 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.594651 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.596187 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestAwsIamAuthenticator (0.01s) === RUN TestKubeAPIServerBuilderAMD64 I0407 01:57:25.606466 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:25.606558 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:25.606589 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:25.606621 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:25.606647 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:25.606679 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:25.606709 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:25.606728 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:25.606753 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:25.606773 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:25.608709 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderAMD64 (1.96s) === RUN TestKubeAPIServerBuilderARM64 I0407 01:57:27.565474 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:27.565626 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:27.565674 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:27.565725 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:27.565768 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:27.565818 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:27.565861 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:27.565891 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:27.565929 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:27.565958 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:27.568606 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeAPIServerBuilderARM64 (1.21s) === RUN TestKubeControllerManagerBuilder I0407 01:57:28.772545 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:28.772636 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:28.772661 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:28.772690 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:28.772712 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:28.772736 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:28.772772 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:28.772789 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:28.772810 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:28.772838 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:28.774123 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilder (0.01s) === RUN TestKubeControllerManagerBuilderAMD64 I0407 01:57:28.779228 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:28.779304 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:28.779325 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:28.779346 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:28.779372 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:28.779407 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:28.779432 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:28.779445 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:28.779463 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:28.779476 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:28.783521 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderAMD64 (1.21s) === RUN TestKubeControllerManagerBuilderARM64 I0407 01:57:29.986437 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:29.986528 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:29.986558 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:29.986594 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:29.986622 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:29.986656 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:29.986685 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:29.986703 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:29.986729 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:29.986761 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:29.988555 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeControllerManagerBuilderARM64 (1.21s) === RUN TestKubeProxyBuilder_buildPod === RUN TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 --- PASS: TestKubeProxyBuilder_buildPod (0.00s) --- PASS: TestKubeProxyBuilder_buildPod/Setup_KubeProxy_for_kubernetes_version_1.20 (0.00s) === RUN TestKubeProxyBuilder I0407 01:57:31.192211 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:31.192303 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:31.192332 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:31.192365 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:31.192390 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:31.192423 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:31.192452 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:31.192469 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:31.192493 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:31.192512 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:31.194093 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilder (0.01s) === RUN TestKubeProxyBuilderAMD64 I0407 01:57:31.197530 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:31.197594 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:31.197615 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:31.197639 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:31.197660 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:31.197686 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:31.197708 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:31.197725 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:31.197745 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:31.197760 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:31.199232 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderAMD64 (1.21s) === RUN TestKubeProxyBuilderARM64 I0407 01:57:32.403470 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:32.403617 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:32.403666 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:32.403722 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:32.403771 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:32.403829 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:32.403881 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:32.403918 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:32.403963 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:32.403995 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:32.406985 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestKubeProxyBuilderARM64 (1.21s) === RUN TestParseDefault --- PASS: TestParseDefault (0.00s) === RUN TestParse --- PASS: TestParse (0.00s) === RUN TestKubeSchedulerBuilder I0407 01:57:33.613191 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:33.613283 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:33.613314 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:33.613348 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:33.613373 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:33.613408 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:33.613438 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:33.613457 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:33.613482 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:33.613500 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:33.615260 6524 zones.go:93] ListHostedZonesPages { } W0407 01:57:33.617733 6524 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilder (0.01s) === RUN TestKubeSchedulerBuilderAMD64 I0407 01:57:33.619487 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:33.619554 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:33.619575 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:33.619597 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:33.619621 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:33.619649 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:33.619674 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:33.619691 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:33.619714 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:33.619730 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:33.621158 6524 zones.go:93] ListHostedZonesPages { } W0407 01:57:34.826172 6524 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderAMD64 (1.21s) === RUN TestKubeSchedulerBuilderARM64 I0407 01:57:34.827957 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:34.828049 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:34.828081 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:34.828112 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:34.828139 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:34.828185 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:34.828224 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:34.828253 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:34.828295 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:34.828317 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:34.830094 6524 zones.go:93] ListHostedZonesPages { } W0407 01:57:36.028361 6524 kube_scheduler.go:112] using embedded kubescheduler configuration --- PASS: TestKubeSchedulerBuilderARM64 (1.20s) === RUN TestKubectlBuilder I0407 01:57:36.031110 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.031242 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.031285 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.031333 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.031372 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.031421 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.031469 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.031498 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.031536 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.031566 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.033419 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:36.035268 6524 assetstore.go:159] Resolved asset kubectl: to /path/to/kubectl/asset --- PASS: TestKubectlBuilder (0.01s) === RUN TestTaintsApplied --- PASS: TestTaintsApplied (0.00s) === RUN Test_RunKubeletBuilder I0407 01:57:36.039586 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.039672 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.039718 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.039750 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.039774 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.039804 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.039829 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.039848 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.039873 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.039890 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.041325 6524 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilder (0.01s) === RUN Test_RunKubeletBuilderWarmPool I0407 01:57:36.044921 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.044995 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.045038 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.045078 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.045105 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.045133 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.045159 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.045177 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.045202 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.045220 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.046413 6524 zones.go:93] ListHostedZonesPages { } --- PASS: Test_RunKubeletBuilderWarmPool (0.00s) === RUN Test_BuildComponentConfigFile --- PASS: Test_BuildComponentConfigFile (0.00s) === RUN TestProtokubeBuilder I0407 01:57:36.050026 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.050102 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.050125 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.050149 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.050171 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.050206 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.050241 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.050259 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.050282 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.050298 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.051796 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:36.053449 6524 assetstore.go:108] Matching assets for "protokube$": I0407 01:57:36.053466 6524 assetstore.go:111] /opt/kops/bin/protokube I0407 01:57:36.053476 6524 assetstore.go:129] Found single matching asset for expr "protokube$": "protokube" I0407 01:57:36.053500 6524 assetstore.go:108] Matching assets for "channels$": I0407 01:57:36.053509 6524 assetstore.go:111] /opt/kops/bin/channels I0407 01:57:36.053517 6524 assetstore.go:129] Found single matching asset for expr "channels$": "channels" --- PASS: TestProtokubeBuilder (0.00s) === RUN TestSecretBuilder I0407 01:57:36.054745 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.054815 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.054838 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.054864 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.054887 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.054915 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.054939 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.054956 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.054979 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.055008 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.056498 6524 zones.go:93] ListHostedZonesPages { } --- PASS: TestSecretBuilder (0.00s) === RUN TestUpdateServiceBuilderAutomaticUpgrade I0407 01:57:36.058557 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.058620 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.058644 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.058667 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.058687 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.058715 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.058736 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.058753 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.058775 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.058790 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.060223 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:36.061813 6524 update_service.go:91] Detected OS {deb ubuntu focal 20.04}; installing unattended-upgrades package --- PASS: TestUpdateServiceBuilderAutomaticUpgrade (0.00s) === RUN TestUpdateServiceBuilderExternal I0407 01:57:36.062174 6524 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:36.062239 6524 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:36.062261 6524 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:36.062283 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:36.062305 6524 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:36.062333 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:36.062354 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:36.062372 6524 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:36.062393 6524 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:36.062409 6524 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:36.063787 6524 zones.go:93] ListHostedZonesPages { } I0407 01:57:36.065435 6524 update_service.go:86] UpdatePolicy requests automatic updates; skipping installation of package "unattended-upgrades" --- PASS: TestUpdateServiceBuilderExternal (0.00s) PASS ok k8s.io/kops/nodeup/pkg/model 10.688s === RUN TestWarmPoolSpec_IsEnabled === RUN TestWarmPoolSpec_IsEnabled/nil === RUN TestWarmPoolSpec_IsEnabled/empty === RUN TestWarmPoolSpec_IsEnabled/1 === RUN TestWarmPoolSpec_IsEnabled/0 --- PASS: TestWarmPoolSpec_IsEnabled (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/nil (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/empty (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/1 (0.00s) --- PASS: TestWarmPoolSpec_IsEnabled/0 (0.00s) === RUN TestWarmPoolSpec_ResolveDefaults === RUN TestWarmPoolSpec_ResolveDefaults/MinSize === RUN TestWarmPoolSpec_ResolveDefaults/MaxSize === RUN TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook --- PASS: TestWarmPoolSpec_ResolveDefaults (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MinSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/MaxSize (0.00s) --- PASS: TestWarmPoolSpec_ResolveDefaults/EnableLifecycleHook (0.00s) === RUN Test_ParseInstanceGroupRole --- PASS: Test_ParseInstanceGroupRole (0.00s) === RUN TestParseConfigYAML === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" === RUN TestParseConfigYAML/"kubeAPIServer:_{}" --- PASS: TestParseConfigYAML (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3140m_}" (0.01s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.14_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{__auditWebhookBatchThrottleQps:_3.140_}" (0.00s) --- PASS: TestParseConfigYAML/"kubeAPIServer:_{}" (0.00s) === RUN Test_SemverOrdering --- PASS: Test_SemverOrdering (0.00s) PASS ok k8s.io/kops/pkg/apis/kops 0.029s === RUN TestRoundTripTypes --- PASS: TestRoundTripTypes (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/install 0.025s === RUN TestUseCiliumEtcd --- PASS: TestUseCiliumEtcd (0.00s) === RUN Test_FindSubnet --- PASS: Test_FindSubnet (0.00s) === RUN Test_FindZonesForInstanceGroup --- PASS: Test_FindZonesForInstanceGroup (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/model 0.023s === RUN TestGetNodeRole === RUN TestGetNodeRole/RoleNone === RUN TestGetNodeRole/RoleNewerLabel === RUN TestGetNodeRole/RoleOlderLabel --- PASS: TestGetNodeRole (0.00s) --- PASS: TestGetNodeRole/RoleNone (0.00s) --- PASS: TestGetNodeRole/RoleNewerLabel (0.00s) --- PASS: TestGetNodeRole/RoleOlderLabel (0.00s) === RUN Test_ParseKubernetesVersion === RUN Test_ParseKubernetesVersion/1.3.7 === RUN Test_ParseKubernetesVersion/v1.4.0-beta.8 === RUN Test_ParseKubernetesVersion/1.5.0 === RUN Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ === RUN Test_ParseKubernetesVersion/#00 E0407 01:57:25.878470 6783 versions.go:96] unable to parse Kubernetes version "" === RUN Test_ParseKubernetesVersion/abc E0407 01:57:25.878568 6783 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: Test_ParseKubernetesVersion (0.00s) --- PASS: Test_ParseKubernetesVersion/1.3.7 (0.00s) --- PASS: Test_ParseKubernetesVersion/v1.4.0-beta.8 (0.00s) --- PASS: Test_ParseKubernetesVersion/1.5.0 (0.00s) --- PASS: Test_ParseKubernetesVersion/https://storage.googleapis.com/k8s-release-dev/ci/v1.4.0-alpha.2.677+ea69570f61af8e/ (0.00s) --- PASS: Test_ParseKubernetesVersion/#00 (0.00s) --- PASS: Test_ParseKubernetesVersion/abc (0.00s) === RUN Test_IsKubernetesGTEWithPatch --- PASS: Test_IsKubernetesGTEWithPatch (0.00s) === RUN Test_IsKubernetesGTEWithoutPatch --- PASS: Test_IsKubernetesGTEWithoutPatch (0.00s) === RUN Test_IsKubernetesGTEWithPre --- PASS: Test_IsKubernetesGTEWithPre (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/util 0.007s === RUN TestAWSValidateExternalCloudConfig --- PASS: TestAWSValidateExternalCloudConfig (0.00s) === RUN TestValidateInstanceGroupSpec I0407 01:57:31.424279 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424378 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424423 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424458 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424490 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestValidateInstanceGroupSpec (0.00s) === RUN TestMixedInstancePolicies I0407 01:57:31.424769 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424812 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424842 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424870 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424903 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424934 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424967 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.424998 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425031 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425060 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425104 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425136 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425169 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425196 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425220 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425260 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425287 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425310 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } I0407 01:57:31.425332 6968 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: TestMixedInstancePolicies (0.00s) === RUN TestInstanceMetadataOptions I0407 01:57:31.425518 6968 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } I0407 01:57:31.425585 6968 images.go:53] DescribeImagesPages: { Filters: [{ Name: "name", Values: [""] }], Owners: ["self"] } --- PASS: TestInstanceMetadataOptions (0.00s) === RUN TestLoadBalancerSubnets --- PASS: TestLoadBalancerSubnets (0.00s) === RUN TestAWSAuthentication --- PASS: TestAWSAuthentication (0.00s) === RUN TestAWSAdditionalRoutes === RUN TestAWSAdditionalRoutes/valid_pcx === RUN TestAWSAdditionalRoutes/valid_instance === RUN TestAWSAdditionalRoutes/valid_nat === RUN TestAWSAdditionalRoutes/valid_transit_gateway === RUN TestAWSAdditionalRoutes/valid_internet_gateway === RUN TestAWSAdditionalRoutes/valid_egress_only_internet_gateway === RUN TestAWSAdditionalRoutes/bad_cluster_cidr === RUN TestAWSAdditionalRoutes/bad_cidr === RUN TestAWSAdditionalRoutes/bad_target === RUN TestAWSAdditionalRoutes/target_more_specific === RUN TestAWSAdditionalRoutes/target_more_specific_additionalCIDR === RUN TestAWSAdditionalRoutes/duplicates_cidr === RUN TestAWSAdditionalRoutes/shared_subnet === RUN TestAWSAdditionalRoutes/not_a_private_subnet --- PASS: TestAWSAdditionalRoutes (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_pcx (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_instance (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_nat (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_transit_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/valid_egress_only_internet_gateway (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cluster_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/bad_target (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific (0.00s) --- PASS: TestAWSAdditionalRoutes/target_more_specific_additionalCIDR (0.00s) --- PASS: TestAWSAdditionalRoutes/duplicates_cidr (0.00s) --- PASS: TestAWSAdditionalRoutes/shared_subnet (0.00s) --- PASS: TestAWSAdditionalRoutes/not_a_private_subnet (0.00s) === RUN TestValidEtcdChanges --- PASS: TestValidEtcdChanges (0.00s) === RUN TestValidateInstanceProfile --- PASS: TestValidateInstanceProfile (0.00s) === RUN TestValidMasterInstanceGroup --- PASS: TestValidMasterInstanceGroup (0.00s) === RUN TestValidBootDevice --- PASS: TestValidBootDevice (0.00s) === RUN TestValidNodeLabels --- PASS: TestValidNodeLabels (0.00s) === RUN TestValidateIGCloudLabels --- PASS: TestValidateIGCloudLabels (0.00s) === RUN TestIGCloudLabelIsIGName --- PASS: TestIGCloudLabelIsIGName (0.00s) === RUN TestValidTaints --- PASS: TestValidTaints (0.00s) === RUN TestIGUpdatePolicy === RUN TestIGUpdatePolicy/missing === RUN TestIGUpdatePolicy/automatic === RUN TestIGUpdatePolicy/external === RUN TestIGUpdatePolicy/empty === RUN TestIGUpdatePolicy/unknown --- PASS: TestIGUpdatePolicy (0.00s) --- PASS: TestIGUpdatePolicy/missing (0.00s) --- PASS: TestIGUpdatePolicy/automatic (0.00s) --- PASS: TestIGUpdatePolicy/external (0.00s) --- PASS: TestIGUpdatePolicy/empty (0.00s) --- PASS: TestIGUpdatePolicy/unknown (0.00s) === RUN TestValidInstanceGroup --- PASS: TestValidInstanceGroup (0.00s) === RUN Test_Validate_DNS --- PASS: Test_Validate_DNS (0.00s) === RUN TestValidateCIDR --- PASS: TestValidateCIDR (0.00s) === RUN TestValidateSubnets --- PASS: TestValidateSubnets (0.00s) === RUN TestValidateKubeAPIServer --- PASS: TestValidateKubeAPIServer (0.00s) === RUN Test_Validate_DockerConfig_Storage --- PASS: Test_Validate_DockerConfig_Storage (0.00s) === RUN Test_Validate_Networking_Flannel --- PASS: Test_Validate_Networking_Flannel (0.00s) === RUN Test_Validate_AdditionalPolicies --- PASS: Test_Validate_AdditionalPolicies (0.00s) === RUN Test_Validate_Calico === RUN Test_Validate_Calico/empty_specs === RUN Test_Validate_Calico/positive_Typha_replica_count === RUN Test_Validate_Calico/negative_Typha_replica_count === RUN Test_Validate_Calico/with_etcd_version === RUN Test_Validate_Calico/IPv4_autodetection_method === RUN Test_Validate_Calico/IPv6_autodetection_method === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method === RUN Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter === RUN Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) === RUN Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name === RUN Test_Validate_Calico/AWS_source/destination_checks_off === RUN Test_Validate_Calico/AWS_source/destination_checks_enabled === RUN Test_Validate_Calico/AWS_source/destination_checks_disabled === RUN Test_Validate_Calico/AWS_source/destination_checks_left_as_is === RUN Test_Validate_Calico/encapsulation_none_with_IPv4 === RUN Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 === RUN Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 === RUN Test_Validate_Calico/unknown_Calico_IPIP_mode === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) === RUN Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) === RUN Test_Validate_Calico/Calico_IPv6_without_encapsulation --- PASS: Test_Validate_Calico (0.00s) --- PASS: Test_Validate_Calico/empty_specs (0.00s) --- PASS: Test_Validate_Calico/positive_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/negative_Typha_replica_count (0.00s) --- PASS: Test_Validate_Calico/with_etcd_version (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv6_autodetection_method_missing_parameter (0.00s) --- PASS: Test_Validate_Calico/IPv4_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/IPv6_autodetection_method_with_parameter_list (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(parenthesis) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_(equals) (0.00s) --- PASS: Test_Validate_Calico/invalid_IPv4_autodetection_method_parameter_with_no_name (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_off (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_enabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_disabled (0.00s) --- PASS: Test_Validate_Calico/AWS_source/destination_checks_left_as_is (0.00s) --- PASS: Test_Validate_Calico/encapsulation_none_with_IPv4 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_IPIP_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/encapsulation_mode_VXLAN_for_IPv6 (0.00s) --- PASS: Test_Validate_Calico/unknown_Calico_IPIP_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(implicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPIP_encapsulation_mode_(explicit)_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(always) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(cross-subnet) (0.00s) --- PASS: Test_Validate_Calico/Calico_VXLAN_encapsulation_mode_with_IPIP_IPPool_mode_(never) (0.00s) --- PASS: Test_Validate_Calico/Calico_IPv6_without_encapsulation (0.00s) === RUN Test_Validate_Cilium --- PASS: Test_Validate_Cilium (0.00s) === RUN Test_Validate_RollingUpdate --- PASS: Test_Validate_RollingUpdate (0.00s) === RUN Test_Validate_NodeLocalDNS --- PASS: Test_Validate_NodeLocalDNS (0.00s) === RUN Test_Validate_CloudConfiguration === RUN Test_Validate_CloudConfiguration/neither === RUN Test_Validate_CloudConfiguration/all_false === RUN Test_Validate_CloudConfiguration/all_true === RUN Test_Validate_CloudConfiguration/os_false === RUN Test_Validate_CloudConfiguration/os_true === RUN Test_Validate_CloudConfiguration/all_false,_os_false === RUN Test_Validate_CloudConfiguration/all_false,_os_true === RUN Test_Validate_CloudConfiguration/all_true,_os_false === RUN Test_Validate_CloudConfiguration/all_true,_os_true --- PASS: Test_Validate_CloudConfiguration (0.00s) --- PASS: Test_Validate_CloudConfiguration/neither (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_false,_os_true (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_false (0.00s) --- PASS: Test_Validate_CloudConfiguration/all_true,_os_true (0.00s) === RUN TestValidateSAExternalPermissions === RUN TestValidateSAExternalPermissions/Duplicate_SA === RUN TestValidateSAExternalPermissions/Missing_permissions === RUN TestValidateSAExternalPermissions/Setting_both_arn_and_inline === RUN TestValidateSAExternalPermissions/Empty_SA_name === RUN TestValidateSAExternalPermissions/Empty_SA_namespace --- PASS: TestValidateSAExternalPermissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Duplicate_SA (0.00s) --- PASS: TestValidateSAExternalPermissions/Missing_permissions (0.00s) --- PASS: TestValidateSAExternalPermissions/Setting_both_arn_and_inline (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_name (0.00s) --- PASS: TestValidateSAExternalPermissions/Empty_SA_namespace (0.00s) === RUN Test_Validate_Nvidia_Cluster --- PASS: Test_Validate_Nvidia_Cluster (0.00s) === RUN Test_Validate_Nvidia_Ig --- PASS: Test_Validate_Nvidia_Ig (0.00s) PASS ok k8s.io/kops/pkg/apis/kops/validation 0.080s === RUN TestManagedFieldsMigrator === RUN TestManagedFieldsMigrator/csa-migration === RUN TestManagedFieldsMigrator/merge-owners === RUN TestManagedFieldsMigrator/ssa-unchanged === RUN TestManagedFieldsMigrator/unknown-unchanged --- PASS: TestManagedFieldsMigrator (0.00s) --- PASS: TestManagedFieldsMigrator/csa-migration (0.00s) --- PASS: TestManagedFieldsMigrator/merge-owners (0.00s) --- PASS: TestManagedFieldsMigrator/ssa-unchanged (0.00s) --- PASS: TestManagedFieldsMigrator/unknown-unchanged (0.00s) PASS ok k8s.io/kops/pkg/applylib/applyset 0.020s === RUN TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub W0407 01:57:31.391427 6970 builder.go:232] failed to digest image "proxy.example.com/weaveworks/weave-kube": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToDockerHub (0.01s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub W0407 01:57:31.392484 6970 builder.go:232] failed to digest image "proxy.example.com/debian": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedDockerHub (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL W0407 01:57:31.393568 6970 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToSimplifiedKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL W0407 01:57:31.396908 6970 builder.go:232] failed to digest image "proxy.example.com/google_containers/kube-apiserver": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToLegacyKubernetesURL (0.00s) === RUN TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags W0407 01:57:31.405625 6970 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerProxy_AppliesToImagesWithTags (0.01s) === RUN TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges W0407 01:57:31.406794 6970 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host W0407 01:57:31.407607 6970 builder.go:232] failed to digest image "proxy.example.com/kube-apiserver:1.2.3": Get "https://proxy.example.com/v2/": dial tcp: lookup proxy.example.com on 172.16.22.1:53: no such host --- PASS: TestValidate_RemapImage_ContainerRegistry_MappingMultipleTimesConverges (0.00s) === RUN TestRemapEmptySection --- PASS: TestRemapEmptySection (0.00s) === RUN Test_BuildVFSPath E0407 01:57:31.408353 6970 copyfile.go:209] Unable to determine VFS path from supplied URL: https://foo/k8s-for-greeks-kops/kubernetes-release/release/v1.7.2/bin/linux/amd64/kubectl E0407 01:57:31.408366 6970 copyfile.go:210] S3, Google Cloud Storage, and File Paths are supported. E0407 01:57:31.408375 6970 copyfile.go:211] For S3, please make sure that the supplied file repository URL adhere to S3 naming conventions, https://docs.aws.amazon.com/general/latest/gr/rande.html#s3_region. E0407 01:57:31.408384 6970 copyfile.go:212] For GCS, please make sure that the supplied file repository URL adheres to https://storage.googleapis.com/ --- PASS: Test_BuildVFSPath (0.00s) PASS ok k8s.io/kops/pkg/assets 0.059s === RUN TestBackoff --- PASS: TestBackoff (0.00s) PASS ok k8s.io/kops/pkg/backoff 0.004s === RUN TestSSHCredentialStoreOnConfigBase --- PASS: TestSSHCredentialStoreOnConfigBase (0.00s) === RUN TestSSHCredentialStoreOnOwnCFS --- PASS: TestSSHCredentialStoreOnOwnCFS (0.00s) PASS ok k8s.io/kops/pkg/client/simple/vfsclientset 0.085s === RUN TestToAzureVMName === RUN TestToAzureVMName/test_case_0 === RUN TestToAzureVMName/test_case_1 --- PASS: TestToAzureVMName (0.00s) --- PASS: TestToAzureVMName/test_case_0 (0.00s) --- PASS: TestToAzureVMName/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/cloudinstances 0.031s === RUN TestSetClusterBadInput --- PASS: TestSetClusterBadInput (0.00s) === RUN TestSetClusterFields --- PASS: TestSetClusterFields (0.01s) === RUN TestSetCiliumFields --- PASS: TestSetCiliumFields (0.00s) === RUN TestSetInstanceGroupsBadInput --- PASS: TestSetInstanceGroupsBadInput (0.00s) === RUN TestSetInstanceGroupsFields --- PASS: TestSetInstanceGroupsFields (0.00s) === RUN TestUnsetClusterBadInput --- PASS: TestUnsetClusterBadInput (0.00s) === RUN TestUnsetClusterFields --- PASS: TestUnsetClusterFields (0.00s) === RUN TestUnsetCiliumFields --- PASS: TestUnsetCiliumFields (0.00s) === RUN TestUnsetInstanceGroupsBadInput --- PASS: TestUnsetInstanceGroupsBadInput (0.00s) === RUN TestUnsetInstanceGroupsFields --- PASS: TestUnsetInstanceGroupsFields (0.00s) PASS ok k8s.io/kops/pkg/commands 0.145s === RUN Test_cacheFilePath --- PASS: Test_cacheFilePath (0.00s) PASS ok k8s.io/kops/pkg/commands/helpers 0.135s === RUN TestGetStructVal --- PASS: TestGetStructVal (0.00s) === RUN TestWrongStructField --- PASS: TestWrongStructField (0.00s) PASS ok k8s.io/kops/pkg/configbuilder 0.026s === RUN Test_Diff_1 --- PASS: Test_Diff_1 (0.00s) === RUN Test_Diff_2 --- PASS: Test_Diff_2 (0.00s) === RUN Test_Diff_3 --- PASS: Test_Diff_3 (0.00s) === RUN Test_Diff_ChangedLine --- PASS: Test_Diff_ChangedLine (0.00s) === RUN Test_Diff_4 --- PASS: Test_Diff_4 (0.00s) PASS ok k8s.io/kops/pkg/diff 0.004s === RUN TestIsGossipHostname --- PASS: TestIsGossipHostname (0.00s) PASS ok k8s.io/kops/pkg/dns 0.004s === RUN TestHasExtraFields === RUN TestHasExtraFields/minimal === RUN TestHasExtraFields/extraFields === RUN TestHasExtraFields/spec2 === RUN TestHasExtraFields/isolateMasters === RUN TestHasExtraFields/instanceGroup --- PASS: TestHasExtraFields (0.02s) --- PASS: TestHasExtraFields/minimal (0.01s) --- PASS: TestHasExtraFields/extraFields (0.00s) --- PASS: TestHasExtraFields/spec2 (0.00s) --- PASS: TestHasExtraFields/isolateMasters (0.00s) --- PASS: TestHasExtraFields/instanceGroup (0.00s) PASS ok k8s.io/kops/pkg/edit 0.045s === RUN TestFlagToFalse I0407 01:57:39.030951 8089 featureflag_test.go:32] Created flag Unittest1 I0407 01:57:39.031011 8089 featureflag.go:164] FeatureFlag "UnitTest1"=false I0407 01:57:39.031021 8089 featureflag.go:164] FeatureFlag "UnitTest1"=true --- PASS: TestFlagToFalse (0.00s) === RUN TestSetenv I0407 01:57:39.031118 8089 featureflag.go:164] FeatureFlag "UnitTest2"=false --- PASS: TestSetenv (0.00s) === RUN TestGetPositive --- PASS: TestGetPositive (0.00s) === RUN TestGetNegative --- PASS: TestGetNegative (0.00s) PASS ok k8s.io/kops/pkg/featureflag 0.004s === RUN TestBuildKCMFlags --- PASS: TestBuildKCMFlags (0.00s) === RUN TestKubeletConfigSpec --- PASS: TestKubeletConfigSpec (0.00s) === RUN TestBuildAPIServerFlags --- PASS: TestBuildAPIServerFlags (0.00s) PASS ok k8s.io/kops/pkg/flagbuilder 0.031s === RUN TestRenderInstanceGroupZones W0407 01:57:39.049398 8091 instancegroup.go:42] error fetching zones for instancegroup: cannot find subnet "badsubnet" (declared in instance group "", not found in cluster) --- PASS: TestRenderInstanceGroupZones (0.00s) === RUN TestRenderInstanceGroupSubnets --- PASS: TestRenderInstanceGroupSubnets (0.00s) PASS ok k8s.io/kops/pkg/formatter 0.024s === RUN TestWarmPoolOnlyRoll I0407 01:57:50.777730 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.777830 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.777858 8604 instancegroups.go:136] deleting warm pool instance "node-1" --- PASS: TestWarmPoolOnlyRoll (0.00s) === RUN TestRollingUpdateDisabledSurgeOS rollingupdate_os_test.go:96: Failing in new release PR when build is not yet published --- SKIP: TestRollingUpdateDisabledSurgeOS (0.00s) === RUN TestRollingUpdateAllNeedUpdate I0407 01:57:50.778382 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.778438 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.779620 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.779642 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.784865 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.784916 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.784937 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.784952 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:50.786530 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:50.787041 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:50.787145 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.787173 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.788309 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.788336 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.793568 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.793638 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:50.794571 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:50.794643 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:50.794683 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.795811 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.795832 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.801196 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.801262 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.801293 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.801333 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:50.802830 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:50.803591 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:50.803626 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.804798 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.804835 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.810046 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.810110 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:50.810878 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:50.810913 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.812054 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.812088 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.817284 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.817347 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:50.818475 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:50.818518 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.819682 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.819718 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.824984 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.825036 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.825095 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.825124 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:50.826521 8604 instancegroups.go:431] Draining the node: "node-2a.local". I0407 01:57:50.827510 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:50.827552 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.828708 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.828739 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.833997 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.834079 8604 instancegroups.go:431] Draining the node: "node-2b.local". I0407 01:57:50.835292 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:50.835331 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.836467 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.836492 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.841743 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.841859 8604 instancegroups.go:431] Draining the node: "node-2c.local". I0407 01:57:50.842710 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:50.842744 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.843879 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.843905 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.849115 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.849172 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdate (0.07s) === RUN TestRollingUpdateAllNeedUpdateCloudonly I0407 01:57:50.849678 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.849710 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.850904 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.850950 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.850989 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.851006 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.851035 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.852181 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.852224 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.852239 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:50.852265 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.853410 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.853438 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.853500 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.853534 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:50.853571 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.854697 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.854753 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.854766 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:50.854787 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.855940 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.855992 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.856006 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:50.856048 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.857233 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.857259 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.857302 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.857317 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:50.857341 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.858448 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.858500 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.858523 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:50.858557 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.859705 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. W0407 01:57:50.859748 8604 instancegroups.go:428] Not draining cluster nodes as 'cloudonly' flag is set. I0407 01:57:50.859761 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:50.859784 8604 instancegroups.go:469] waiting for 1ms after terminating instance W0407 01:57:50.860909 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0407 01:57:50.860953 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateCloudonly (0.01s) === RUN TestRollingUpdateAllNeedUpdateNoFailOnValidate I0407 01:57:50.861428 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.861468 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.862639 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.862673 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.862695 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.862737 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.862759 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.862776 8604 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.862789 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:50.863599 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:50.864391 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:50.864460 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.864488 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.865627 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.865674 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.865695 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.865739 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:50.866668 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:50.866722 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:50.866752 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.867891 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.867921 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.867942 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.867966 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.867985 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.868003 8604 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.868018 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:50.869084 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:50.869912 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:50.869938 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.871069 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.871106 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.871131 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.871185 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:50.872066 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:50.872103 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.873237 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.873277 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.873301 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.873341 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:50.874163 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:50.874201 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.875343 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.875374 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.875398 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.875416 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.875437 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.875454 8604 instancegroups.go:516] Cluster validation failed, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.875471 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:50.876523 8604 instancegroups.go:431] Draining the node: "node-2a.local". I0407 01:57:50.877113 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:50.877136 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.878256 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.878284 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.878325 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.878360 8604 instancegroups.go:431] Draining the node: "node-2b.local". I0407 01:57:50.879232 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:50.879264 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.880366 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.880384 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.880396 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.880417 8604 instancegroups.go:431] Draining the node: "node-2c.local". I0407 01:57:50.880896 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:50.880916 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.882032 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.882061 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. W0407 01:57:50.882082 8604 instancegroups.go:516] Cluster validation failed after terminating instance, proceeding since fail-on-validate is set to false: cluster did not validate within a duration of "0s" I0407 01:57:50.882106 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateAllNeedUpdateNoFailOnValidate (0.02s) === RUN TestRollingUpdateNoneNeedUpdate I0407 01:57:50.882504 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdate (0.00s) === RUN TestRollingUpdateNoneNeedUpdateWithForce I0407 01:57:50.882780 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.882808 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.883953 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.883978 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.889180 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.889250 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.889285 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.889301 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:50.890325 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:50.891171 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:50.891251 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.891304 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.892814 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.892852 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.898100 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.898162 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:50.899174 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:50.899254 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:50.899294 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.900482 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.900538 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.905753 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.905791 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.905805 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.905815 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:50.906853 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:50.907668 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:50.907704 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.908824 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.908844 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.914067 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.914124 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:50.915028 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:50.915078 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.916241 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.916265 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.921457 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.922206 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:50.922927 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:50.922967 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.924107 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.924139 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.929319 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.929357 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.929379 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.929396 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:50.930374 8604 instancegroups.go:431] Draining the node: "node-2a.local". I0407 01:57:50.930954 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:50.930980 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.932101 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.932125 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.937355 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.937415 8604 instancegroups.go:431] Draining the node: "node-2b.local". I0407 01:57:50.937976 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:50.938002 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.939128 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.939158 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.944339 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.944383 8604 instancegroups.go:431] Draining the node: "node-2c.local". I0407 01:57:50.944944 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:50.944969 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.946099 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.946126 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.951379 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.951416 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNoneNeedUpdateWithForce (0.07s) === RUN TestRollingUpdateEmptyGroup I0407 01:57:50.951544 8604 rollingupdate.go:111] Cloud Instance Group length is zero. Not doing a rolling-update. --- PASS: TestRollingUpdateEmptyGroup (0.00s) === RUN TestRollingUpdateUnknownRole --- PASS: TestRollingUpdateUnknownRole (0.00s) === RUN TestRollingUpdateAllNeedUpdateFailsValidation I0407 01:57:50.951854 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.951877 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.952995 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.953019 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:50.953032 8604 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateFailsValidation (0.00s) === RUN TestRollingUpdateAllNeedUpdateErrorsValidation I0407 01:57:50.953215 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.953231 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.954361 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.954387 8604 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0407 01:57:50.954409 8604 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateAllNeedUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateFailsValidation I0407 01:57:50.954619 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.954643 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:50.954661 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:50.954678 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateFailsValidation (0.00s) === RUN TestRollingUpdateNodes1NeedsUpdateErrorsValidation I0407 01:57:50.954831 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.954851 8604 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0407 01:57:50.954868 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:50.954883 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateNodes1NeedsUpdateErrorsValidation (0.00s) === RUN TestRollingUpdateClusterFailsValidationAfterOneMaster I0407 01:57:50.955122 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.955150 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.956343 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.956370 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.961603 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.961679 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.961709 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.961725 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:50.962536 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:50.963282 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:50.963365 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.963396 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.964548 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.964574 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:50.964590 8604 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterFailsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneMaster I0407 01:57:50.964792 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:50.964809 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.965938 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.965966 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.971209 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.971276 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.971301 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.971321 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:50.972315 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:50.973216 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:50.973289 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:50.973330 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.974473 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.974505 8604 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0407 01:57:50.974530 8604 instancegroups.go:509] Cluster did not validate within 0s --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneMaster (0.01s) === RUN TestRollingUpdateNonRelatedInstanceGroupFailure I0407 01:57:50.974925 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.974950 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.974964 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:50.976193 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:50.977088 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:50.977176 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.978325 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.978361 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.983550 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.983603 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:50.984259 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:50.984283 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.985408 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.985434 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.990677 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.990729 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:50.991328 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:50.991355 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:50.992496 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.992529 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:50.997730 8604 instancegroups.go:540] Cluster validated. I0407 01:57:50.997766 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateNonRelatedInstanceGroupFailure (0.02s) === RUN TestRollingUpdateRelatedInstanceGroupFailure I0407 01:57:50.998041 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:50.998060 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:50.998078 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:50.998090 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateRelatedInstanceGroupFailure (0.00s) === RUN TestRollingUpdateMasterGroupFailure I0407 01:57:51.000507 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.000572 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:51.000600 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:51.000645 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateMasterGroupFailure (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupNil I0407 01:57:51.001298 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.001319 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:51.001330 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:51.001340 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupNil (0.00s) === RUN TestRollingUpdateValidationErrorInstanceGroupExitableError I0407 01:57:51.001513 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.001528 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.001537 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.002207 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.002715 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.002740 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.003924 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.003964 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.009129 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.009227 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.010145 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.010181 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.011369 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.011417 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.016637 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.016699 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.017328 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.017357 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.018499 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.018533 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.023766 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.023808 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.023827 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:51.023848 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:51.023859 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-2": error validating cluster: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateValidationErrorInstanceGroupExitableError (0.02s) === RUN TestRollingUpdateClusterFailsValidationAfterOneNode I0407 01:57:51.024096 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.024112 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.024124 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.024779 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.025253 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.025275 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.026406 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.026444 8604 instancegroups.go:560] Cluster did not pass validation within deadline: testing failure. E0407 01:57:51.026466 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:51.026484 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterFailsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateClusterErrorsValidationAfterOneNode I0407 01:57:51.026700 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.026725 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.026738 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.027715 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.028179 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.028201 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.029353 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.029382 8604 instancegroups.go:550] Cluster did not validate within deadline: testing validation error. E0407 01:57:51.029398 8604 instancegroups.go:509] Cluster did not validate within 0s E0407 01:57:51.029409 8604 rollingupdate.go:218] failed to roll InstanceGroup "node-1": error validating cluster after terminating instance: cluster did not validate within a duration of "0s" --- PASS: TestRollingUpdateClusterErrorsValidationAfterOneNode (0.00s) === RUN TestRollingUpdateFlappingValidation I0407 01:57:51.029612 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:51.029636 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.030766 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.030813 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.031939 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.038090 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.039267 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.044529 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.045681 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.050965 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.051084 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.051125 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.051150 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:51.052233 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:51.053181 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:51.053274 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:51.053314 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.054481 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.054520 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.059800 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.059880 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:51.060891 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:51.060973 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:51.061010 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.062142 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.062183 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.067445 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.067509 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.067542 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.067561 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.068692 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.069490 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.069524 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.070682 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.070723 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.075974 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.076065 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.077226 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.077269 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.078456 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.078492 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.083720 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.083793 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.084735 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.084771 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.085903 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.085937 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.091161 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.091203 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.091252 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.091272 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:51.092327 8604 instancegroups.go:431] Draining the node: "node-2a.local". I0407 01:57:51.093133 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:51.093167 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.094359 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.094392 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.099630 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.099725 8604 instancegroups.go:431] Draining the node: "node-2b.local". I0407 01:57:51.100715 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:51.100756 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.101915 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.101996 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.107238 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.107313 8604 instancegroups.go:431] Draining the node: "node-2c.local". I0407 01:57:51.107947 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:51.107984 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.109352 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.109427 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.114726 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.114785 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateFlappingValidation (0.09s) === RUN TestRollingUpdateValidatesAfterBastion I0407 01:57:51.115088 8604 instancegroups.go:630] Stopping instance "bastion-1a", in group "bastion-1" (this may take a while). I0407 01:57:51.115112 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.116269 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.116319 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.117447 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.118567 8604 instancegroups.go:563] Cluster did not pass validation, will retry in "1ms": testing failure. I0407 01:57:51.119668 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.124853 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.124920 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.124945 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.124964 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:51.125754 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:51.126462 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:51.126531 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:51.126563 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.127750 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.127790 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.132981 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.133027 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:51.133751 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:51.133816 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:51.133838 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.134979 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.135020 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.140220 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.140256 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.140269 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.140279 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.140873 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.141326 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.141350 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.142493 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.142532 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.147747 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.147806 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.148673 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.148708 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.149886 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.149928 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.155106 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.155163 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.156024 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.156058 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.157237 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.157276 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.162481 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.162517 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.162538 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.162556 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:51.163556 8604 instancegroups.go:431] Draining the node: "node-2a.local". I0407 01:57:51.164308 8604 instancegroups.go:628] Stopping instance "node-2a", node "node-2a.local", in group "node-2" (this may take a while). I0407 01:57:51.164342 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.165521 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.165562 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.170772 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.170841 8604 instancegroups.go:431] Draining the node: "node-2b.local". I0407 01:57:51.171760 8604 instancegroups.go:628] Stopping instance "node-2b", node "node-2b.local", in group "node-2" (this may take a while). I0407 01:57:51.171800 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.172984 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.173023 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.178221 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.178267 8604 instancegroups.go:431] Draining the node: "node-2c.local". I0407 01:57:51.179087 8604 instancegroups.go:628] Stopping instance "node-2c", node "node-2c.local", in group "node-2" (this may take a while). I0407 01:57:51.179119 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.180276 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.180325 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.185534 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.185578 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateValidatesAfterBastion (0.07s) === RUN TestAddAnnotatedNodesToNeedsUpdate --- PASS: TestAddAnnotatedNodesToNeedsUpdate (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateCloudonly --- PASS: TestAddAnnotatedNodesToNeedsUpdateCloudonly (0.00s) === RUN TestAddAnnotatedNodesToNeedsUpdateNodesMissing --- PASS: TestAddAnnotatedNodesToNeedsUpdateNodesMissing (0.00s) === RUN TestRollingUpdateTaintAllButOneNeedUpdate I0407 01:57:51.186210 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.186235 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.186250 8604 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0407 01:57:51.187001 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.187778 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.187816 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.191705 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.191766 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.197017 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.197095 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.198092 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.198129 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.199269 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.199296 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.204532 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.204574 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateTaintAllButOneNeedUpdate (0.02s) === RUN TestRollingUpdateMaxSurgeIgnoredForMaster I0407 01:57:51.204864 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.204882 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.204891 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:51.205453 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:51.206000 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:51.206052 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:51.206072 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.207210 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.207229 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.212411 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.212452 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:51.212994 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:51.213040 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:51.213060 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.214199 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.214217 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.219415 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.219451 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeIgnoredForMaster (0.01s) === RUN TestRollingUpdateDisabled I0407 01:57:51.219760 8604 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled W0407 01:57:51.219786 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0407 01:57:51.219798 8604 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled W0407 01:57:51.219807 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0407 01:57:51.219817 8604 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled W0407 01:57:51.219824 8604 instancegroups.go:502] Not validating cluster as cloudonly flag is set. I0407 01:57:51.219833 8604 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0407 01:57:51.219842 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabled (0.00s) === RUN TestRollingUpdateDisabledSurge I0407 01:57:51.219978 8604 instancegroups.go:607] Detaching instance "bastion-1a", in group "bastion-1". I0407 01:57:51.220011 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:51.221123 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.221142 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.226331 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.226366 8604 instancegroups.go:216] Rolling updates for InstanceGroup bastion-1 are disabled I0407 01:57:51.226427 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.226451 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.226467 8604 instancegroups.go:342] Tainting 2 nodes in "master-1" instancegroup. I0407 01:57:51.226997 8604 instancegroups.go:216] Rolling updates for InstanceGroup master-1 are disabled I0407 01:57:51.227014 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.227025 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.227032 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:51.227643 8604 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0407 01:57:51.227699 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:51.228835 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.228857 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.234049 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.234081 8604 instancegroups.go:216] Rolling updates for InstanceGroup node-1 are disabled I0407 01:57:51.234096 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.234119 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.234130 8604 instancegroups.go:342] Tainting 3 nodes in "node-2" instancegroup. I0407 01:57:51.234758 8604 instancegroups.go:605] Detaching instance "node-2c", node "node-2c.local", in group "node-2". I0407 01:57:51.234800 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:51.235923 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.235947 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:51.241185 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.241222 8604 instancegroups.go:216] Rolling updates for InstanceGroup node-2 are disabled I0407 01:57:51.241240 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDisabledSurge (0.02s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdate I0407 01:57:51.241483 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.241506 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.241515 8604 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0407 01:57:51.242762 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.243255 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.243286 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.244425 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.244467 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.244505 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.244528 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.245480 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.245666 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.245701 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.246844 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.246889 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.347284 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.347355 8604 instancegroups.go:431] Draining the node: "node-1e.local". I0407 01:57:51.347378 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:51.348370 8604 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0407 01:57:51.348626 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:51.348669 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.349832 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.349862 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.349882 8604 instancegroups.go:431] Draining the node: "node-1f.local". I0407 01:57:51.350332 8604 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0407 01:57:51.350357 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.351476 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.351525 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.451960 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.452028 8604 instancegroups.go:431] Draining the node: "node-1g.local". I0407 01:57:51.452644 8604 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0407 01:57:51.452680 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.453832 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.453860 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.453874 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllButOneNeedUpdate I0407 01:57:51.454048 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.454069 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.454077 8604 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0407 01:57:51.455078 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.455118 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.456075 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.456238 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.456267 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.457393 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.457433 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.557837 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.557921 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:51.557931 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.558921 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.559145 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:51.559186 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.560303 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.560331 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.560357 8604 instancegroups.go:431] Draining the node: "node-1e.local". I0407 01:57:51.560802 8604 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0407 01:57:51.560828 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.561944 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.561991 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.662409 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.662488 8604 instancegroups.go:431] Draining the node: "node-1f.local". I0407 01:57:51.663358 8604 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0407 01:57:51.663405 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.664626 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.664662 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.664684 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxUnavailableAllNeedUpdateMaster I0407 01:57:51.664895 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.664921 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.664935 8604 instancegroups.go:342] Tainting 7 nodes in "master-1" instancegroup. I0407 01:57:51.666166 8604 instancegroups.go:431] Draining the node: "master-1a.local". I0407 01:57:51.666581 8604 instancegroups.go:691] skipping deregistration of instance "master-1a", as part of instancegroup with role "ControlPlane" I0407 01:57:51.666632 8604 instancegroups.go:628] Stopping instance "master-1a", node "master-1a.local", in group "master-1" (this may take a while). I0407 01:57:51.666665 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.667818 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.667870 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.667922 8604 instancegroups.go:431] Draining the node: "master-1c.local". I0407 01:57:51.667959 8604 instancegroups.go:431] Draining the node: "master-1b.local". I0407 01:57:51.668850 8604 instancegroups.go:691] skipping deregistration of instance "master-1b", as part of instancegroup with role "ControlPlane" I0407 01:57:51.668892 8604 instancegroups.go:628] Stopping instance "master-1b", node "master-1b.local", in group "master-1" (this may take a while). I0407 01:57:51.669024 8604 instancegroups.go:691] skipping deregistration of instance "master-1c", as part of instancegroup with role "ControlPlane" I0407 01:57:51.669055 8604 instancegroups.go:628] Stopping instance "master-1c", node "master-1c.local", in group "master-1" (this may take a while). I0407 01:57:51.669074 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.670201 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.670242 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.770647 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.770743 8604 instancegroups.go:431] Draining the node: "master-1e.local". I0407 01:57:51.770770 8604 instancegroups.go:431] Draining the node: "master-1d.local". I0407 01:57:51.771742 8604 instancegroups.go:691] skipping deregistration of instance "master-1d", as part of instancegroup with role "ControlPlane" I0407 01:57:51.771805 8604 instancegroups.go:628] Stopping instance "master-1d", node "master-1d.local", in group "master-1" (this may take a while). I0407 01:57:51.772030 8604 instancegroups.go:691] skipping deregistration of instance "master-1e", as part of instancegroup with role "ControlPlane" I0407 01:57:51.772083 8604 instancegroups.go:628] Stopping instance "master-1e", node "master-1e.local", in group "master-1" (this may take a while). I0407 01:57:51.772124 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.773305 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.773351 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.773384 8604 instancegroups.go:431] Draining the node: "master-1f.local". I0407 01:57:51.773911 8604 instancegroups.go:691] skipping deregistration of instance "master-1f", as part of instancegroup with role "ControlPlane" I0407 01:57:51.773963 8604 instancegroups.go:628] Stopping instance "master-1f", node "master-1f.local", in group "master-1" (this may take a while). I0407 01:57:51.773989 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.775128 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.775210 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.876350 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.876426 8604 instancegroups.go:431] Draining the node: "master-1g.local". I0407 01:57:51.877245 8604 instancegroups.go:691] skipping deregistration of instance "master-1g", as part of instancegroup with role "ControlPlane" I0407 01:57:51.877320 8604 instancegroups.go:628] Stopping instance "master-1g", node "master-1g.local", in group "master-1" (this may take a while). I0407 01:57:51.877363 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.878511 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.878558 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.878579 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxUnavailableAllNeedUpdateMaster (0.21s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdate I0407 01:57:51.878885 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.878917 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.878932 8604 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0407 01:57:51.880570 8604 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0407 01:57:51.880627 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:51.881773 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.881803 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.881819 8604 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0407 01:57:51.881863 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:51.882977 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.883007 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.883053 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:51.883093 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:51.883969 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:51.884200 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:51.884238 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.885353 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.885404 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.985832 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.985919 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:51.986838 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:51.986892 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:51.987599 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:51.987638 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.988763 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.988808 8604 instancegroups.go:540] Cluster validated. I0407 01:57:51.988842 8604 instancegroups.go:431] Draining the node: "node-1e.local". I0407 01:57:51.989591 8604 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0407 01:57:51.989635 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:51.990721 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:51.990783 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.091193 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.091257 8604 instancegroups.go:431] Draining the node: "node-1f.local". I0407 01:57:52.091893 8604 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0407 01:57:52.091936 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.093085 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.093118 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.093133 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeAllButOneNeedUpdate I0407 01:57:52.093318 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.093344 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.093354 8604 instancegroups.go:342] Tainting 6 nodes in "node-1" instancegroup. I0407 01:57:52.094548 8604 instancegroups.go:605] Detaching instance "node-1f", node "node-1f.local", in group "node-1". I0407 01:57:52.094580 8604 instancegroups.go:605] Detaching instance "node-1e", node "node-1e.local", in group "node-1". I0407 01:57:52.094605 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:52.095750 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.095777 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.095802 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.095836 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.096654 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.096811 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.096838 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.097981 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.098028 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.198443 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.198511 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:52.198543 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:52.199129 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:52.199830 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:52.199874 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.201012 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.201051 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.201084 8604 instancegroups.go:431] Draining the node: "node-1e.local". I0407 01:57:52.201851 8604 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0407 01:57:52.201894 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.203020 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.203063 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.303705 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.303789 8604 instancegroups.go:431] Draining the node: "node-1f.local". I0407 01:57:52.304723 8604 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0407 01:57:52.304779 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.305946 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.305986 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.306010 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllButOneNeedUpdate (0.21s) === RUN TestRollingUpdateMaxSurgeGreaterThanNeedUpdate I0407 01:57:52.306222 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.306242 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.306255 8604 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0407 01:57:52.306701 8604 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0407 01:57:52.306725 8604 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". I0407 01:57:52.306760 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:52.307884 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.307904 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.313026 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.313095 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.313112 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.314088 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.314116 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.314339 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.314371 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.315234 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.315254 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.320522 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.320569 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeGreaterThanNeedUpdate (0.01s) === RUN TestRollingUpdateDetachFails I0407 01:57:52.320804 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.320821 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.320830 8604 instancegroups.go:342] Tainting 2 nodes in "node-1" instancegroup. I0407 01:57:52.322332 8604 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". E0407 01:57:52.322711 8604 instancegroups.go:191] Failed to detach instance "node-1b": error detaching instance "node-1b", node "node-1b.local": error detaching instance "node-1b": testing error I0407 01:57:52.322740 8604 instancegroups.go:605] Detaching instance "node-1a", node "node-1a.local", in group "node-1". E0407 01:57:52.322776 8604 instancegroups.go:191] Failed to detach instance "node-1a": error detaching instance "node-1a", node "node-1a.local": error detaching instance "node-1a": testing error I0407 01:57:52.322803 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:52.331515 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.331572 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.336739 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.336820 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.336872 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.337926 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.337963 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.338194 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.338229 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.339136 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.339164 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.344372 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.344408 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateDetachFails (0.02s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached I0407 01:57:52.344713 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.344749 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.344765 8604 instancegroups.go:342] Tainting 4 nodes in "node-1" instancegroup. I0407 01:57:52.345998 8604 instancegroups.go:605] Detaching instance "node-1c", node "node-1c.local", in group "node-1". I0407 01:57:52.346057 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:52.347211 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.347260 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.347270 8604 instancegroups.go:605] Detaching instance "node-1b", node "node-1b.local", in group "node-1". I0407 01:57:52.347314 8604 instancegroups.go:203] waiting for 1ms after detaching instance I0407 01:57:52.348432 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.348463 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.348501 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:52.348530 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.348556 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.349769 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:52.349804 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.350036 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.350079 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.350246 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.350277 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.350947 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.451381 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.451445 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:52.452086 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:52.452124 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.453254 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.453289 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.453313 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached (0.11s) === RUN TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached I0407 01:57:52.453567 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.453597 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.453611 8604 instancegroups.go:342] Tainting 7 nodes in "node-1" instancegroup. I0407 01:57:52.455489 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.456156 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.456201 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.457490 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.457518 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.457541 8604 instancegroups.go:431] Draining the node: "node-1e.local". I0407 01:57:52.457567 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:52.458629 8604 instancegroups.go:628] Stopping instance "node-1e", node "node-1e.local", in group "node-1" (this may take a while). I0407 01:57:52.458830 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:52.458860 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.459981 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.460030 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.560520 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.560594 8604 instancegroups.go:431] Draining the node: "node-1g.local". I0407 01:57:52.560655 8604 instancegroups.go:431] Draining the node: "node-1f.local". I0407 01:57:52.561634 8604 instancegroups.go:628] Stopping instance "node-1f", node "node-1f.local", in group "node-1" (this may take a while). I0407 01:57:52.561838 8604 instancegroups.go:628] Stopping instance "node-1g", node "node-1g.local", in group "node-1" (this may take a while). I0407 01:57:52.561875 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.563823 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.563854 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.563882 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.564609 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.564643 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.565781 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.565822 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.666248 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.666323 8604 instancegroups.go:431] Draining the node: "node-1d.local". I0407 01:57:52.667216 8604 instancegroups.go:628] Stopping instance "node-1d", node "node-1d.local", in group "node-1" (this may take a while). I0407 01:57:52.667265 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.668430 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.668491 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.668524 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached (0.22s) === RUN TestRollingUpdateOnlyWarmPoolNodes I0407 01:57:52.668797 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.668817 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.668830 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0407 01:57:52.668845 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0407 01:57:52.668856 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0407 01:57:52.668876 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingUpdateOnlyWarmPoolNodes (0.00s) === RUN TestRollingWarmPoolBeforeJoinedNodes I0407 01:57:52.669014 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.669041 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.669054 8604 instancegroups.go:342] Tainting 3 nodes in "node-1" instancegroup. I0407 01:57:52.669922 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-a" I0407 01:57:52.669942 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-b" I0407 01:57:52.669954 8604 instancegroups.go:136] deleting warm pool instance "node-1-wp-c" I0407 01:57:52.669987 8604 instancegroups.go:431] Draining the node: "node-1a.local". I0407 01:57:52.670634 8604 instancegroups.go:628] Stopping instance "node-1a", node "node-1a.local", in group "node-1" (this may take a while). I0407 01:57:52.670662 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.671843 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.671874 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.677074 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.677131 8604 instancegroups.go:431] Draining the node: "node-1b.local". I0407 01:57:52.677862 8604 instancegroups.go:628] Stopping instance "node-1b", node "node-1b.local", in group "node-1" (this may take a while). I0407 01:57:52.677891 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.679044 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.679067 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.684288 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.684358 8604 instancegroups.go:431] Draining the node: "node-1c.local". I0407 01:57:52.685221 8604 instancegroups.go:628] Stopping instance "node-1c", node "node-1c.local", in group "node-1" (this may take a while). I0407 01:57:52.685255 8604 instancegroups.go:469] waiting for 1ms after terminating instance I0407 01:57:52.686442 8604 instancegroups.go:504] Validating the cluster. I0407 01:57:52.686477 8604 instancegroups.go:543] Cluster validated; revalidating in 5ms to make sure it does not flap. I0407 01:57:52.691697 8604 instancegroups.go:540] Cluster validated. I0407 01:57:52.691751 8604 rollingupdate.go:234] Rolling update completed for cluster ""! --- PASS: TestRollingWarmPoolBeforeJoinedNodes (0.02s) === RUN TestSettings === RUN TestSettings/DrainAndTerminate === RUN TestSettings/MaxUnavailable === RUN TestSettings/MaxSurge --- PASS: TestSettings (0.00s) --- PASS: TestSettings/DrainAndTerminate (0.00s) --- PASS: TestSettings/MaxUnavailable (0.00s) --- PASS: TestSettings/MaxSurge (0.00s) === RUN TestMaxUnavailable === RUN TestMaxUnavailable/0_1 === RUN TestMaxUnavailable/0%_1 === RUN TestMaxUnavailable/39%_10 === RUN TestMaxUnavailable/100%_10 --- PASS: TestMaxUnavailable (0.00s) --- PASS: TestMaxUnavailable/0_1 (0.00s) --- PASS: TestMaxUnavailable/0%_1 (0.00s) --- PASS: TestMaxUnavailable/39%_10 (0.00s) --- PASS: TestMaxUnavailable/100%_10 (0.00s) === RUN TestMaxSurge === RUN TestMaxSurge/0_1 === RUN TestMaxSurge/0%_1 === RUN TestMaxSurge/31%_10 === RUN TestMaxSurge/100%_10 --- PASS: TestMaxSurge (0.00s) --- PASS: TestMaxSurge/0_1 (0.00s) --- PASS: TestMaxSurge/0%_1 (0.00s) --- PASS: TestMaxSurge/31%_10 (0.00s) --- PASS: TestMaxSurge/100%_10 (0.00s) === RUN TestAWSDefault --- PASS: TestAWSDefault (0.00s) PASS ok k8s.io/kops/pkg/instancegroups 2.000s === RUN TestWriteToken === RUN TestWriteToken/WriteJson === RUN TestWriteToken/WriteJsonWithIndent --- PASS: TestWriteToken (0.00s) --- PASS: TestWriteToken/WriteJson (0.00s) --- PASS: TestWriteToken/WriteJsonWithIndent (0.00s) PASS ok k8s.io/kops/pkg/jsonutils 0.004s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.00s) PASS ok k8s.io/kops/pkg/k8scodecs 0.011s === RUN TestParse E0407 01:57:50.705708 8607 versions.go:96] unable to parse Kubernetes version "" E0407 01:57:50.705831 8607 versions.go:96] unable to parse Kubernetes version "abc" --- PASS: TestParse (0.00s) === RUN TestIsGTE === RUN TestIsGTE/KV_greater_than_Version === RUN TestIsGTE/KV_greater_than_Version#01 === RUN TestIsGTE/KV_equal_Version === RUN TestIsGTE/KV_equal_Version#01 === RUN TestIsGTE/Version_greater_than_KV === RUN TestIsGTE/Version_greater_than_KV#01 --- PASS: TestIsGTE (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version (0.00s) --- PASS: TestIsGTE/KV_greater_than_Version#01 (0.00s) --- PASS: TestIsGTE/KV_equal_Version (0.00s) --- PASS: TestIsGTE/KV_equal_Version#01 (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV (0.00s) --- PASS: TestIsGTE/Version_greater_than_KV#01 (0.00s) PASS ok k8s.io/kops/pkg/k8sversion 0.009s === RUN TestToVersionedYaml --- PASS: TestToVersionedYaml (0.01s) === RUN TestToVersionedJSON --- PASS: TestToVersionedJSON (0.00s) === RUN TestRewriteAPIGroup --- PASS: TestRewriteAPIGroup (0.00s) PASS ok k8s.io/kops/pkg/kopscodecs 0.039s === RUN TestBuildKubecfg === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster === RUN TestBuildKubecfg/Public_DNS_with_kops_auth_plugin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin === RUN TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option === RUN TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option --- PASS: TestBuildKubecfg (0.18s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_secondary_NLB_port (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_admin_and_CLB_ACM_Certificate (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin_and_with_ACM_certificate (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_without_admin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Public_DNS_with_Empty_Master_Name (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster (0.00s) --- PASS: TestBuildKubecfg/Public_DNS_with_kops_auth_plugin (0.00s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_internal_DNS_name_with_admin (0.02s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_For_Gossip_cluster_with_admin_and_secondary_NLB_port (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_with_admin_and_internal_option (0.03s) --- PASS: TestBuildKubecfg/Test_Kube_Config_Data_for_Public_cluster_without_admin_and_with_internal_option (0.00s) PASS ok k8s.io/kops/pkg/kubeconfig 0.236s === RUN Test_ProxyFunc --- PASS: Test_ProxyFunc (0.00s) === RUN TestBootstrapUserData --- PASS: TestBootstrapUserData (0.01s) === RUN TestValidateAWSVolumeAllow50ratio --- PASS: TestValidateAWSVolumeAllow50ratio (0.00s) PASS ok k8s.io/kops/pkg/model 0.093s === RUN TestRootVolumeOptimizationFlag --- PASS: TestRootVolumeOptimizationFlag (0.00s) === RUN TestAPIServerAdditionalSecurityGroupsWithNLB === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane === RUN TestAPIServerAdditionalSecurityGroupsWithNLB/Node --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Bastion (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/ControlPlane (0.00s) --- PASS: TestAPIServerAdditionalSecurityGroupsWithNLB/Node (0.00s) === RUN TestJoinSuffixes --- PASS: TestJoinSuffixes (0.00s) === RUN TestIAMServiceEC2 --- PASS: TestIAMServiceEC2 (0.00s) === RUN Test_formatAWSIAMStatement === RUN Test_formatAWSIAMStatement/namespace_and_name_without_wildcard === RUN Test_formatAWSIAMStatement/name_contains_wildcard === RUN Test_formatAWSIAMStatement/namespace_contains_wildcard --- PASS: Test_formatAWSIAMStatement (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_and_name_without_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/name_contains_wildcard (0.00s) --- PASS: Test_formatAWSIAMStatement/namespace_contains_wildcard (0.00s) PASS ok k8s.io/kops/pkg/model/awsmodel 0.095s === RUN TestAPILoadBalancerModelBuilder_Build --- PASS: TestAPILoadBalancerModelBuilder_Build (0.00s) === RUN TestSubnetForLoadbalancer --- PASS: TestSubnetForLoadbalancer (0.00s) === RUN TestCloudTagsForInstanceGroup --- PASS: TestCloudTagsForInstanceGroup (0.00s) === RUN TestNetworkModelBuilder_Build --- PASS: TestNetworkModelBuilder_Build (0.00s) === RUN TestResourceGroupModelBuilder_Build --- PASS: TestResourceGroupModelBuilder_Build (0.00s) === RUN TestVMScaleSetModelBuilder_Build --- PASS: TestVMScaleSetModelBuilder_Build (0.00s) === RUN TestGetCapacity === RUN TestGetCapacity/test_case_0 === RUN TestGetCapacity/test_case_1 === RUN TestGetCapacity/test_case_2 === RUN TestGetCapacity/test_case_3 --- PASS: TestGetCapacity (0.00s) --- PASS: TestGetCapacity/test_case_0 (0.00s) --- PASS: TestGetCapacity/test_case_1 (0.00s) --- PASS: TestGetCapacity/test_case_2 (0.00s) --- PASS: TestGetCapacity/test_case_3 (0.00s) === RUN TestGetStorageProfile === RUN TestGetStorageProfile/test_case_0 === RUN TestGetStorageProfile/test_case_1 --- PASS: TestGetStorageProfile (0.00s) --- PASS: TestGetStorageProfile/test_case_0 (0.00s) --- PASS: TestGetStorageProfile/test_case_1 (0.00s) === RUN TestParseImage === RUN TestParseImage/test_case_0 === RUN TestParseImage/test_case_1 === RUN TestParseImage/test_case_2 === RUN TestParseImage/test_case_3 --- PASS: TestParseImage (0.00s) --- PASS: TestParseImage/test_case_0 (0.00s) --- PASS: TestParseImage/test_case_1 (0.00s) --- PASS: TestParseImage/test_case_2 (0.00s) --- PASS: TestParseImage/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/model/azuremodel 0.077s === RUN TestCloudConfigurationOptionsBuilder === RUN TestCloudConfigurationOptionsBuilder/neither === RUN TestCloudConfigurationOptionsBuilder/all_false === RUN TestCloudConfigurationOptionsBuilder/all_true === RUN TestCloudConfigurationOptionsBuilder/os_false === RUN TestCloudConfigurationOptionsBuilder/os_true === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_false,_os_true === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_false === RUN TestCloudConfigurationOptionsBuilder/all_true,_os_true --- PASS: TestCloudConfigurationOptionsBuilder (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/neither (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_false,_os_true (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_false (0.00s) --- PASS: TestCloudConfigurationOptionsBuilder/all_true,_os_true (0.00s) === RUN Test_Build_Containerd_Supported_Version --- PASS: Test_Build_Containerd_Supported_Version (0.00s) === RUN Test_Build_Containerd_Unneeded_Runtime --- PASS: Test_Build_Containerd_Unneeded_Runtime (0.00s) === RUN Test_Build_Containerd_Needed_Runtime --- PASS: Test_Build_Containerd_Needed_Runtime (0.00s) === RUN TestImage I0407 01:57:50.752791 8613 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestImage (0.00s) === RUN Test_Build_KCM_Builder --- PASS: Test_Build_KCM_Builder (0.00s) === RUN Test_Build_KCM_Builder_Change_Duration --- PASS: Test_Build_KCM_Builder_Change_Duration (0.00s) === RUN Test_Build_KCM_Builder_CIDR_Mask_Size === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: === RUN Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/100.64.1.0/11: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/65: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/32:2001:DB8::/65 (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/95: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/96: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/97: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/98: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/99: (0.00s) --- PASS: Test_Build_KCM_Builder_CIDR_Mask_Size/2001:DB8::/100: (0.00s) === RUN TestFeatureGatesKubernetesVersion --- PASS: TestFeatureGatesKubernetesVersion (0.00s) === RUN TestFeatureGatesOverride --- PASS: TestFeatureGatesOverride (0.00s) === RUN Test_Build_Scheduler_Without_PolicyConfigMap --- PASS: Test_Build_Scheduler_Without_PolicyConfigMap (0.00s) === RUN Test_Build_Scheduler_PolicyConfigMap_Supported_Version --- PASS: Test_Build_Scheduler_PolicyConfigMap_Supported_Version (0.00s) PASS ok k8s.io/kops/pkg/model/components 0.059s === RUN Test_RunEtcdManagerBuilder I0407 01:57:50.761084 8615 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunEtcdManagerBuilder/basedir=tests/minimal === RUN Test_RunEtcdManagerBuilder/basedir=tests/interval === RUN Test_RunEtcdManagerBuilder/basedir=tests/proxy === RUN Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings W0407 01:57:50.809001 8615 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 W0407 01:57:50.813041 8615 model.go:421] overriding log level in manifest (embedded etcd manifest), new level is 3 --- PASS: Test_RunEtcdManagerBuilder (0.06s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/minimal (0.02s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/interval (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/proxy (0.01s) --- PASS: Test_RunEtcdManagerBuilder/basedir=tests/overwrite_settings (0.02s) PASS ok k8s.io/kops/pkg/model/components/etcdmanager 0.128s === RUN Test_RunKubeApiserverBuilder I0407 01:57:50.775769 8617 featureflag.go:164] FeatureFlag "ImageDigest"=false === RUN Test_RunKubeApiserverBuilder/basedir=tests/minimal --- PASS: Test_RunKubeApiserverBuilder (0.01s) --- PASS: Test_RunKubeApiserverBuilder/basedir=tests/minimal (0.01s) PASS ok k8s.io/kops/pkg/model/components/kubeapiserver 0.095s === RUN Test_RunKubeSchedulerBuilder === RUN Test_RunKubeSchedulerBuilder/basedir=tests/minimal === RUN Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig === RUN Test_RunKubeSchedulerBuilder/basedir=tests/mixing --- PASS: Test_RunKubeSchedulerBuilder (0.02s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/minimal (0.01s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/kubeschedulerconfig (0.00s) --- PASS: Test_RunKubeSchedulerBuilder/basedir=tests/mixing (0.00s) PASS ok k8s.io/kops/pkg/model/components/kubescheduler 0.100s === RUN TestDefaultInstanceGroupVolumeSize --- PASS: TestDefaultInstanceGroupVolumeSize (0.00s) PASS ok k8s.io/kops/pkg/model/defaults 0.030s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) === RUN TestPolicyGeneration --- PASS: TestPolicyGeneration (0.00s) === RUN TestEmptyPolicy --- PASS: TestEmptyPolicy (0.00s) PASS ok k8s.io/kops/pkg/model/iam 0.059s === RUN TestServerGroupBuilder I0407 01:57:58.456621 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.470785 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.483539 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.563629 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.576051 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.594673 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.614433 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.631940 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.651227 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.667236 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.679284 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.688708 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.739404 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.746969 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.753603 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.760765 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.766818 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.775738 9525 featureflag.go:164] FeatureFlag "ImageDigest"=false --- PASS: TestServerGroupBuilder (0.33s) PASS ok k8s.io/kops/pkg/model/openstackmodel 0.428s === RUN Test_NodeUpTabs --- PASS: Test_NodeUpTabs (0.00s) PASS ok k8s.io/kops/pkg/model/resources 0.038s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetVMSSNameFromProviderID === RUN TestGetVMSSNameFromProviderID/test_case_0 === RUN TestGetVMSSNameFromProviderID/test_case_1 === RUN TestGetVMSSNameFromProviderID/test_case_2 --- PASS: TestGetVMSSNameFromProviderID (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_0 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_1 (0.00s) --- PASS: TestGetVMSSNameFromProviderID/test_case_2 (0.00s) === RUN TestIdentifyNode === RUN TestIdentifyNode/test_case_0 === RUN TestIdentifyNode/test_case_1 --- PASS: TestIdentifyNode (0.00s) --- PASS: TestIdentifyNode/test_case_0 (0.00s) --- PASS: TestIdentifyNode/test_case_1 (0.00s) PASS ok k8s.io/kops/pkg/nodeidentity/azure 0.039s === RUN TestBuildNodeLabels === RUN TestBuildNodeLabels/RoleControlPlane === RUN TestBuildNodeLabels/RoleNode --- PASS: TestBuildNodeLabels (0.00s) --- PASS: TestBuildNodeLabels/RoleControlPlane (0.00s) --- PASS: TestBuildNodeLabels/RoleNode (0.00s) PASS ok k8s.io/kops/pkg/nodelabels 0.037s === RUN TestGenerateCertificate === RUN TestGenerateCertificate/selfsigned === RUN TestGenerateCertificate/client === RUN TestGenerateCertificate/server --- PASS: TestGenerateCertificate (0.01s) --- PASS: TestGenerateCertificate/selfsigned (0.00s) --- PASS: TestGenerateCertificate/client (0.00s) --- PASS: TestGenerateCertificate/server (0.00s) === RUN TestCertificateRoundTrip --- PASS: TestCertificateRoundTrip (0.00s) === RUN TestIssueCert === RUN TestIssueCert/ca === RUN TestIssueCert/client === RUN TestIssueCert/clientOneYear === RUN TestIssueCert/#00 === RUN TestIssueCert/server --- PASS: TestIssueCert (1.38s) --- PASS: TestIssueCert/ca (0.64s) --- PASS: TestIssueCert/client (0.30s) --- PASS: TestIssueCert/clientOneYear (0.43s) --- PASS: TestIssueCert/#00 (0.00s) --- PASS: TestIssueCert/server (0.00s) === RUN TestPrivateKeyRoundTripRSA === RUN TestPrivateKeyRoundTripRSA/rsa === RUN TestPrivateKeyRoundTripRSA/ecdsa --- PASS: TestPrivateKeyRoundTripRSA (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/rsa (0.00s) --- PASS: TestPrivateKeyRoundTripRSA/ecdsa (0.00s) === RUN Test_AWSFingerprint_RsaKey1 --- PASS: Test_AWSFingerprint_RsaKey1 (0.00s) === RUN Test_AWSFingerprint_RsaKeyEncrypted --- PASS: Test_AWSFingerprint_RsaKeyEncrypted (0.00s) === RUN Test_AWSFingerprint_Ed25519Key --- PASS: Test_AWSFingerprint_Ed25519Key (0.00s) === RUN Test_AWSFingerprint_TrickyWhitespace --- PASS: Test_AWSFingerprint_TrickyWhitespace (0.00s) === RUN Test_AWSFingerprint_DsaKey --- PASS: Test_AWSFingerprint_DsaKey (0.00s) === RUN Test_OpenSSHFingerprint_RsaKey1 --- PASS: Test_OpenSSHFingerprint_RsaKey1 (0.00s) PASS ok k8s.io/kops/pkg/pki 1.390s === RUN TestLongDesc --- PASS: TestLongDesc (0.00s) PASS ok k8s.io/kops/pkg/pretty 0.005s === RUN TestAddUntaggedRouteTables I0407 01:57:58.442316 9531 routetable.go:53] DescribeRouteTables: { } I0407 01:57:58.442487 9531 aws.go:230] Skipping route table in VPC, but with wrong cluster tag ("other.example.com") W0407 01:57:58.442510 9531 tags.go:67] cluster tag not found on route-table:rtb-1234 --- PASS: TestAddUntaggedRouteTables (0.00s) === RUN TestListIAMInstanceProfiles I0407 01:57:58.442677 9531 iaminstanceprofile.go:193] ListInstanceProfiles: { } W0407 01:57:58.442777 9531 aws.go:2076] could not find instance profile "__no_entity__.me.example.com". Resource may already have been deleted: NoSuchEntity: No such entity --- PASS: TestListIAMInstanceProfiles (0.00s) === RUN TestListIAMRoles I0407 01:57:58.442895 9531 iamrole.go:89] ListRoles: { } --- PASS: TestListIAMRoles (0.00s) === RUN TestListRouteTables I0407 01:57:58.443045 9531 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["me.example.com"] }] } I0407 01:57:58.443278 9531 routetable.go:53] DescribeRouteTables: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/me.example.com"] }] } --- PASS: TestListRouteTables (0.00s) === RUN TestSharedVolume I0407 01:57:58.443494 9531 volumes.go:33] CreateVolume: { TagSpecifications: [{ ResourceType: "volume", Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "shared" }] }] } I0407 01:57:58.443727 9531 volumes.go:33] CreateVolume: { TagSpecifications: [{ Tags: [{ Key: "kubernetes.io/cluster/me.example.com", Value: "owned" }] }] } I0407 01:57:58.443845 9531 volumes.go:128] DescribeVolumes: { } W0407 01:57:58.443940 9531 aws.go:2229] (new) cluster tag not found on volume:vol-2 aws_test.go:334: 2 --- PASS: TestSharedVolume (0.00s) === RUN TestMatchesElbTags --- PASS: TestMatchesElbTags (0.00s) === RUN TestListVPCs I0407 01:57:58.444314 9531 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:57:58.444504 9531 internetgateways.go:66] CreateInternetGateway: { } I0407 01:57:58.444614 9531 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:57:58.444760 9531 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:57:58.444901 9531 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:57:58.445035 9531 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:57:58.445153 9531 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:57:58.445222 9531 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:57:58.445304 9531 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:57:58.445370 9531 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:57:58.445434 9531 tags.go:42] CreateTags { Resources: ["vpc-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "legacy.example.com" }] } I0407 01:57:58.445516 9531 tags.go:42] CreateTags { Resources: ["vpc-shared"], Tags: [{ Key: "kubernetes.io/cluster/shared.example.com", Value: "shared" }] } I0407 01:57:58.445565 9531 tags.go:42] CreateTags { Resources: ["vpc-shared-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "shared-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/shared-with-legacy.example.com", Value: "shared" }] } I0407 01:57:58.445695 9531 tags.go:42] CreateTags { Resources: ["vpc-owned"], Tags: [{ Key: "kubernetes.io/cluster/owned.example.com", Value: "owned" }] } I0407 01:57:58.445788 9531 tags.go:42] CreateTags { Resources: ["vpc-owned-with-legacy"], Tags: [{ Key: "KubernetesCluster", Value: "owned-with-legacy.example.com" },{ Key: "kubernetes.io/cluster/owned-with-legacy.example.com", Value: "owned" }] } I0407 01:57:58.445898 9531 tags.go:42] CreateTags { Resources: ["vpc-other"], Tags: [{ Key: "KubernetesCluster", Value: "other.example.com" },{ Key: "kubernetes.io/cluster/other.example.com", Value: "shared" }] } I0407 01:57:58.446024 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["mismatch.example.com"] }] } I0407 01:57:58.446102 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/mismatch.example.com"] }] } I0407 01:57:58.446167 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["legacy.example.com"] }] } I0407 01:57:58.446225 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/legacy.example.com"] }] } I0407 01:57:58.446264 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared-with-legacy.example.com"] }] } I0407 01:57:58.446294 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared-with-legacy.example.com"] }] } I0407 01:57:58.446333 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["shared.example.com"] }] } I0407 01:57:58.446365 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/shared.example.com"] }] } I0407 01:57:58.446403 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned-with-legacy.example.com"] }] } I0407 01:57:58.446434 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned-with-legacy.example.com"] }] } I0407 01:57:58.446482 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:KubernetesCluster", Values: ["owned.example.com"] }] } I0407 01:57:58.446516 9531 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag-key", Values: ["kubernetes.io/cluster/owned.example.com"] }] } --- PASS: TestListVPCs (0.00s) PASS ok k8s.io/kops/pkg/resources/aws 0.081s === RUN TestListResourcesAzure --- PASS: TestListResourcesAzure (0.00s) === RUN TestIsOwnedByCluster === RUN TestIsOwnedByCluster/test_case_0 === RUN TestIsOwnedByCluster/test_case_1 === RUN TestIsOwnedByCluster/test_case_2 === RUN TestIsOwnedByCluster/test_case_3 --- PASS: TestIsOwnedByCluster (0.00s) --- PASS: TestIsOwnedByCluster/test_case_0 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_1 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_2 (0.00s) --- PASS: TestIsOwnedByCluster/test_case_3 (0.00s) PASS ok k8s.io/kops/pkg/resources/azure 0.037s === RUN TestNameMatch --- PASS: TestNameMatch (0.00s) === RUN TestMatchesClusterNameWithUUID --- PASS: TestMatchesClusterNameWithUUID (0.00s) PASS ok k8s.io/kops/pkg/resources/gce 0.076s === RUN TestEscapeCommand --- PASS: TestEscapeCommand (0.00s) === RUN TestRawManifest --- PASS: TestRawManifest (0.00s) === RUN TestRawMixedManifest --- PASS: TestRawMixedManifest (0.00s) === RUN TestKeyPairOnlyManifest --- PASS: TestKeyPairOnlyManifest (0.00s) === RUN TestUnitFileExtensionValid === RUN TestUnitFileExtensionValid/valid_extension:_.automount === RUN TestUnitFileExtensionValid/valid_extension:_.device === RUN TestUnitFileExtensionValid/valid_extension:_.mount === RUN TestUnitFileExtensionValid/valid_extension:_.path === RUN TestUnitFileExtensionValid/valid_extension:_.scope === RUN TestUnitFileExtensionValid/valid_extension:_.service === RUN TestUnitFileExtensionValid/valid_extension:_.slice === RUN TestUnitFileExtensionValid/valid_extension:_.socket === RUN TestUnitFileExtensionValid/valid_extension:_.swap === RUN TestUnitFileExtensionValid/valid_extension:_.target === RUN TestUnitFileExtensionValid/valid_extension:_.timer === RUN TestUnitFileExtensionValid/invalid_extension:_(no_extension) === RUN TestUnitFileExtensionValid/invalid_extension:_.not-valid --- PASS: TestUnitFileExtensionValid (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.automount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.device (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.mount (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.path (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.scope (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.service (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.slice (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.socket (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.swap (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.target (0.00s) --- PASS: TestUnitFileExtensionValid/valid_extension:_.timer (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_(no_extension) (0.00s) --- PASS: TestUnitFileExtensionValid/invalid_extension:_.not-valid (0.00s) PASS ok k8s.io/kops/pkg/systemd 0.004s === RUN TestTruncateString === RUN TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false === RUN TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true === RUN TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false --- PASS: TestTruncateString (0.00s) --- PASS: TestTruncateString/input:foo/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_33_characters_long/maxLength:64/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:false (0.00s) --- PASS: TestTruncateString/input:this_string_is_longer_it_is_46_characters_long/maxLength:32/alwaysAddHash:true (0.00s) --- PASS: TestTruncateString/input:this_string_is_even_longer_due_to_extreme_verbosity_it_is_in_fact_84_characters_long/maxLength:64/alwaysAddHash:false (0.00s) PASS ok k8s.io/kops/pkg/truncate 0.004s === RUN TestJoin --- PASS: TestJoin (0.00s) PASS ok k8s.io/kops/pkg/urls 0.003s === RUN TestRoundTrip --- PASS: TestRoundTrip (0.00s) PASS ok k8s.io/kops/pkg/util/stringorslice 0.004s === RUN Test_Overlap --- PASS: Test_Overlap (0.00s) === RUN Test_BelongsTo --- PASS: Test_BelongsTo (0.00s) === RUN Test_SplitInto8 --- PASS: Test_SplitInto8 (0.00s) PASS ok k8s.io/kops/pkg/util/subnet 0.004s === RUN TestRenderGeneralOK --- PASS: TestRenderGeneralOK (0.01s) === RUN TestRenderMissingValue --- PASS: TestRenderMissingValue (0.00s) === RUN TestRenderIndent --- PASS: TestRenderIndent (0.00s) === RUN TestRenderChannelFunctions --- PASS: TestRenderChannelFunctions (0.00s) === RUN TestRenderSnippet --- PASS: TestRenderSnippet (0.00s) === RUN TestRenderContext --- PASS: TestRenderContext (0.00s) === RUN TestAllowForMissingVars --- PASS: TestAllowForMissingVars (0.00s) === RUN TestRenderIntegration --- PASS: TestRenderIntegration (0.00s) PASS ok k8s.io/kops/pkg/util/templater 0.049s === RUN Test_ValidateCloudGroupMissing --- PASS: Test_ValidateCloudGroupMissing (0.00s) === RUN Test_ValidateNodesNotEnough --- PASS: Test_ValidateNodesNotEnough (0.00s) === RUN Test_ValidateDetachedNodesDontCount --- PASS: Test_ValidateDetachedNodesDontCount (0.00s) === RUN Test_ValidateNodeNotReady --- PASS: Test_ValidateNodeNotReady (0.00s) === RUN Test_ValidateMastersNotEnough --- PASS: Test_ValidateMastersNotEnough (0.00s) === RUN Test_ValidateMasterNotReady --- PASS: Test_ValidateMasterNotReady (0.00s) === RUN Test_ValidateMasterStaticPods --- PASS: Test_ValidateMasterStaticPods (0.00s) === RUN Test_ValidateNoPodFailures --- PASS: Test_ValidateNoPodFailures (0.00s) === RUN Test_ValidatePodFailure === RUN Test_ValidatePodFailure/pending-node-kube-system === RUN Test_ValidatePodFailure/pending-node-kube-system#01 === RUN Test_ValidatePodFailure/pending-node-kube-system#02 === RUN Test_ValidatePodFailure/pending-node-otherNamespace === RUN Test_ValidatePodFailure/pending-node-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-node-otherNamespace#02 === RUN Test_ValidatePodFailure/pending-cluster-kube-system === RUN Test_ValidatePodFailure/pending-cluster-kube-system#01 === RUN Test_ValidatePodFailure/pending-cluster-kube-system#02 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/pending-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-node-kube-system === RUN Test_ValidatePodFailure/notready-node-kube-system#01 === RUN Test_ValidatePodFailure/notready-node-kube-system#02 === RUN Test_ValidatePodFailure/notready-node-otherNamespace === RUN Test_ValidatePodFailure/notready-node-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-node-otherNamespace#02 === RUN Test_ValidatePodFailure/notready-cluster-kube-system === RUN Test_ValidatePodFailure/notready-cluster-kube-system#01 === RUN Test_ValidatePodFailure/notready-cluster-kube-system#02 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/notready-cluster-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-node-kube-system === RUN Test_ValidatePodFailure/unknown-node-kube-system#01 === RUN Test_ValidatePodFailure/unknown-node-kube-system#02 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-node-otherNamespace#02 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#01 === RUN Test_ValidatePodFailure/unknown-cluster-kube-system#02 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 === RUN Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 --- PASS: Test_ValidatePodFailure (0.01s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/pending-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/notready-cluster-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-node-otherNamespace#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-kube-system#02 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#01 (0.00s) --- PASS: Test_ValidatePodFailure/unknown-cluster-otherNamespace#02 (0.00s) === RUN Test_ValidateBastionNodes === RUN Test_ValidateBastionNodes/instancegroup's_nodes_not_ready === RUN Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready --- PASS: Test_ValidateBastionNodes (0.00s) --- PASS: Test_ValidateBastionNodes/instancegroup's_nodes_not_ready (0.00s) --- PASS: Test_ValidateBastionNodes/bastion_instancegroup_nodes_not_ready (0.00s) === RUN Test_ValidateDetachedNodesNotValidated --- PASS: Test_ValidateDetachedNodesNotValidated (0.00s) PASS ok k8s.io/kops/pkg/validation 0.094s === RUN TestUnmarshalMetadata --- PASS: TestUnmarshalMetadata (0.00s) === RUN TestGetInternalIP --- PASS: TestGetInternalIP (0.00s) === RUN TestGetSeeds --- PASS: TestGetSeeds (0.00s) PASS ok k8s.io/kops/protokube/pkg/gossip/azure 0.005s === RUN TestRemovesDuplicateGuardedBlocks W0407 01:58:06.052758 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052807 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052814 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052819 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052825 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052830 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052835 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052840 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052845 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052849 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052854 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052859 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052863 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052868 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.052873 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.052877 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058286 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058321 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058442 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058468 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058563 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058579 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058665 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058681 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058766 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058781 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.058895 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.058910 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059010 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059027 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059130 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059145 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059221 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059234 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059312 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059326 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059412 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059426 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059496 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059510 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059597 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059612 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059698 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059714 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059797 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059848 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.059943 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.059959 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060042 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060057 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060139 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060155 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060245 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060261 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060395 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060411 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060498 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060514 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060601 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060624 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060709 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060723 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060807 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060820 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.060907 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.060922 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061005 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061017 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061100 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061113 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061192 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061205 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061311 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061328 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061415 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061429 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061518 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061532 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061615 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061628 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061705 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061718 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061813 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061827 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.061916 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.061929 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062009 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062022 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062121 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062136 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062275 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062290 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062378 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062392 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062479 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062494 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062637 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062651 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062729 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062743 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062836 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062851 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.062939 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.062954 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063039 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063056 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063144 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063174 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063265 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063282 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063374 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063390 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063477 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063492 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063577 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063594 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063673 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063686 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063762 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063775 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063863 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063878 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.063957 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.063973 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064054 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064068 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064152 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064169 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064257 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064273 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064352 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064366 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064449 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064464 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064552 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064569 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064653 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064669 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064751 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064766 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064884 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.064901 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.064990 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065007 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065110 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065127 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065211 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065226 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065307 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065326 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065407 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065422 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065508 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065524 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065600 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065614 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065687 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065703 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065788 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065804 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065890 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.065905 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.065989 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066005 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.066088 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066107 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.066187 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066202 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.066280 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066294 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.066377 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066392 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.066478 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.066493 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067215 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067233 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067316 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067331 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067414 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067429 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067510 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067525 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067661 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067676 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067758 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067772 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067848 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067864 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.067940 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.067955 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068035 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068052 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068130 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068197 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068314 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068377 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068521 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068581 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068712 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068764 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068857 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068873 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.068956 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.068972 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.069059 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.069074 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.069156 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.069173 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.069255 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.069269 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.069350 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.069365 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.069444 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.069459 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRemovesDuplicateGuardedBlocks (0.02s) === RUN TestRecoversFromBadNesting W0407 01:58:06.069962 10832 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0407 01:58:06.069978 10832 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0407 01:58:06.069991 10832 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0407 01:58:06.070002 10832 hosts.go:144] /etc/hosts guard-block end seen before guard-block start; will ignore end W0407 01:58:06.070012 10832 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0407 01:58:06.070020 10832 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0407 01:58:06.070027 10832 hosts.go:131] /etc/hosts guard-block begin seen while in guard block; will ignore W0407 01:58:06.070061 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070076 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070087 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.070097 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070107 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.070116 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070126 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.070135 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070144 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.070153 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070163 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070173 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070183 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070192 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.070202 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.070212 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073573 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073598 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073659 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073667 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073718 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073726 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073783 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073791 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073891 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073900 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.073951 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.073959 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074011 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074019 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074067 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074075 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074124 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074132 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074203 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074216 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074275 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074291 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074356 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074366 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074440 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074453 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074532 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074547 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074605 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074630 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074689 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074707 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074762 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074775 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074844 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074860 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074920 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.074935 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.074997 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075010 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075096 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075110 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075187 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075203 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075266 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075278 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075341 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075353 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075416 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075428 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075497 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075509 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075573 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075585 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075649 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075661 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075748 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075761 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075827 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075839 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075903 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075915 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.075980 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.075993 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076056 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076068 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076131 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076143 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076212 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076227 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076298 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076314 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076388 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076400 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076471 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076483 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076562 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076576 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076647 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076659 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076730 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076742 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076818 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076831 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076902 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076915 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.076986 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.076998 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077071 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077083 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077157 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077170 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077245 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077265 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077348 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077370 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077455 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077474 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077561 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077580 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077664 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077686 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077772 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077791 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.077908 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.077926 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078008 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078026 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078111 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078129 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078213 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078231 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078318 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078338 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078435 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078500 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078588 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078601 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078671 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078684 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078757 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078769 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078836 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078849 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.078925 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.078937 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079007 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079020 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079090 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079103 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079169 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079182 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079248 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079261 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079333 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079345 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079413 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079425 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079494 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079507 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079575 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079588 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079655 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079667 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079737 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079750 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079816 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079828 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079903 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.079918 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.079988 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080003 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080101 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080115 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080183 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080199 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080268 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080281 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080347 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080359 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080426 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080439 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080505 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080517 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080589 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080602 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080674 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080687 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080754 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080770 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080835 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080848 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080915 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.080927 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.080996 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081009 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081079 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081092 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081159 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081172 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081237 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081249 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081313 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081326 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081427 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081440 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081505 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081518 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081584 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081596 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081659 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081671 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081752 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081766 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081832 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081845 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" W0407 01:58:06.081909 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# Begin host entries managed by kops - do not edit" W0407 01:58:06.081960 10832 hosts.go:57] ignoring extra guard line in /etc/hosts: "# End host entries managed by kops" --- PASS: TestRecoversFromBadNesting (0.01s) PASS ok k8s.io/kops/protokube/pkg/gossip/dns/hosts 0.033s === RUN TestSerializeEmptyCluster --- PASS: TestSerializeEmptyCluster (0.01s) PASS ok k8s.io/kops/tests/codecs 0.034s === RUN TestKopsUpgrades --- PASS: TestKopsUpgrades (0.01s) === RUN TestKubernetesUpgrades --- PASS: TestKubernetesUpgrades (0.00s) === RUN TestFindImage --- PASS: TestFindImage (0.00s) === RUN TestRecommendedKubernetesVersion --- PASS: TestRecommendedKubernetesVersion (0.00s) === RUN TestOrdering --- PASS: TestOrdering (0.00s) === RUN TestChannelsSelfConsistent --- PASS: TestChannelsSelfConsistent (0.02s) === RUN TestChannelImages === RUN TestChannelImages/stable-channel === RUN TestChannelImages/alpha-channel --- PASS: TestChannelImages (0.00s) --- PASS: TestChannelImages/stable-channel (0.00s) --- PASS: TestChannelImages/alpha-channel (0.00s) PASS ok k8s.io/kops/tests/integration/channel 0.068s === RUN TestConversionMinimal === RUN TestConversionMinimal/legacy-v1alpha2-v1alpha2 --- PASS: TestConversionMinimal (0.02s) --- PASS: TestConversionMinimal/legacy-v1alpha2-v1alpha2 (0.02s) PASS ok k8s.io/kops/tests/integration/conversion 0.045s === RUN Test_tryResourceAsString --- PASS: Test_tryResourceAsString (0.00s) === RUN Test_DryrunTarget_PrintReport --- PASS: Test_DryrunTarget_PrintReport (0.00s) === RUN TestWriteFile I0407 01:58:06.083523 10841 files.go:57] Writing file "/tmp/TestWriteFile3517168235/001/SubDir/test1.tmp" I0407 01:58:06.083660 10841 files.go:113] Changing file mode for "/tmp/TestWriteFile3517168235/001/SubDir/test1.tmp" to -rw-r--r-- --- PASS: TestWriteFile (0.00s) === RUN TestBigInt_Format --- PASS: TestBigInt_Format (0.00s) === RUN TestVFSCAStoreRoundTrip --- PASS: TestVFSCAStoreRoundTrip (0.01s) === RUN TestAddItem === RUN TestAddItem/first_primary === RUN TestAddItem/first_secondary === RUN TestAddItem/firstBigSerial_primary === RUN TestAddItem/firstBigSerial_secondary === RUN TestAddItem/after_primary === RUN TestAddItem/after_secondary === RUN TestAddItem/bigSerialAfter_primary === RUN TestAddItem/bigSerialAfter_secondary === RUN TestAddItem/before_primary === RUN TestAddItem/before_secondary === RUN TestAddItem/first_certonly_primary === RUN TestAddItem/first_certonly_secondary === RUN TestAddItem/after_certonly_primary === RUN TestAddItem/after_certonly_secondary === RUN TestAddItem/before_certonly_primary === RUN TestAddItem/before_certonly_secondary --- PASS: TestAddItem (0.00s) --- PASS: TestAddItem/first_primary (0.00s) --- PASS: TestAddItem/first_secondary (0.00s) --- PASS: TestAddItem/firstBigSerial_primary (0.00s) --- PASS: TestAddItem/firstBigSerial_secondary (0.00s) --- PASS: TestAddItem/after_primary (0.00s) --- PASS: TestAddItem/after_secondary (0.00s) --- PASS: TestAddItem/bigSerialAfter_primary (0.00s) --- PASS: TestAddItem/bigSerialAfter_secondary (0.00s) --- PASS: TestAddItem/before_primary (0.00s) --- PASS: TestAddItem/before_secondary (0.00s) --- PASS: TestAddItem/first_certonly_primary (0.00s) --- PASS: TestAddItem/first_certonly_secondary (0.00s) --- PASS: TestAddItem/after_certonly_primary (0.00s) --- PASS: TestAddItem/after_certonly_secondary (0.00s) --- PASS: TestAddItem/before_certonly_primary (0.00s) --- PASS: TestAddItem/before_certonly_secondary (0.00s) PASS ok k8s.io/kops/upup/pkg/fi 0.045s === RUN TestBootstrapChannelBuilder_BuildTasks I0407 01:58:09.109744 11648 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:09.109896 11648 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:09.109929 11648 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:09.109961 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:09.109993 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:09.110044 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:09.110078 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:09.110095 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:09.110124 11648 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:09.110152 11648 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:09.118912 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.258636 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.385089 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.554123 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.683896 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.805217 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:09.934337 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:10.068623 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:10.627270 11648 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_BuildTasks (1.62s) === RUN TestBootstrapChannelBuilder_ServiceAccountIAM I0407 01:58:10.730357 11648 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:10.730437 11648 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:10.730496 11648 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:10.730530 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:10.730559 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:10.730593 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:10.730621 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:10.730638 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:10.730662 11648 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:10.730680 11648 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:10.730700 11648 featureflag.go:167] Unknown FeatureFlag "+UseServiceAccountExternalPermissions" I0407 01:58:10.731778 11648 zones.go:93] ListHostedZonesPages { } I0407 01:58:10.892474 11648 featureflag.go:167] Unknown FeatureFlag "-UseServiceAccountExternalPermissions" --- PASS: TestBootstrapChannelBuilder_ServiceAccountIAM (0.16s) === RUN TestBootstrapChannelBuilder_AWSCloudController I0407 01:58:10.892616 11648 featureflag.go:164] FeatureFlag "ImageDigest"=false I0407 01:58:10.892690 11648 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:10.892740 11648 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { VpcId: "vpc-12345678" } I0407 01:58:10.892776 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-12345678" } I0407 01:58:10.892802 11648 subnets.go:185] AuthorizeSecurityGroupIngress: { RouteTableId: "rtb-12345678", SubnetId: "subnet-abcdef" } I0407 01:58:10.892836 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-1" } I0407 01:58:10.892864 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-2" } I0407 01:58:10.892881 11648 targetgroups.go:94] CreateTargetGroup { Name: "my-external-tg-3" } I0407 01:58:10.892905 11648 iaminstanceprofile.go:56] CreateInstanceProfile: { InstanceProfileName: "kops-custom-node-role" } I0407 01:58:10.892924 11648 iaminstanceprofile.go:128] AddRoleToInstanceProfile: { InstanceProfileName: "kops-custom-node-role", RoleName: "kops-custom-node-role" } I0407 01:58:10.894066 11648 zones.go:93] ListHostedZonesPages { } --- PASS: TestBootstrapChannelBuilder_AWSCloudController (0.13s) === RUN TestContainerdVersionUrl === RUN TestContainerdVersionUrl/1.4.1- === RUN TestContainerdVersionUrl/1.4.1-arm === RUN TestContainerdVersionUrl/-amd64 === RUN TestContainerdVersionUrl/-arm64 === RUN TestContainerdVersionUrl/1.1.1-amd64 === RUN TestContainerdVersionUrl/1.1.1-arm64 === RUN TestContainerdVersionUrl/1.6.5-amd64 === RUN TestContainerdVersionUrl/1.5.5-arm64 --- PASS: TestContainerdVersionUrl (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1- (0.00s) --- PASS: TestContainerdVersionUrl/1.4.1-arm (0.00s) --- PASS: TestContainerdVersionUrl/-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.1.1-arm64 (0.00s) --- PASS: TestContainerdVersionUrl/1.6.5-amd64 (0.00s) --- PASS: TestContainerdVersionUrl/1.5.5-arm64 (0.00s) === RUN TestDeepValidate_OK --- PASS: TestDeepValidate_OK (0.00s) === RUN TestDeepValidate_NoNodeZones --- PASS: TestDeepValidate_NoNodeZones (0.00s) === RUN TestDeepValidate_NoMasterZones --- PASS: TestDeepValidate_NoMasterZones (0.00s) === RUN TestDeepValidate_BadZone deepvalidate_test.go:58: Zone validation not checked by DeepValidate --- SKIP: TestDeepValidate_BadZone (0.00s) === RUN TestDeepValidate_MixedRegion deepvalidate_test.go:70: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_MixedRegion (0.00s) === RUN TestDeepValidate_RegionAsZone deepvalidate_test.go:84: Region validation not checked by DeepValidate --- SKIP: TestDeepValidate_RegionAsZone (0.00s) === RUN TestDeepValidate_NotIncludedZone --- PASS: TestDeepValidate_NotIncludedZone (0.00s) === RUN TestDeepValidate_DuplicateZones --- PASS: TestDeepValidate_DuplicateZones (0.00s) === RUN TestDeepValidate_ExtraMasterZone --- PASS: TestDeepValidate_ExtraMasterZone (0.00s) === RUN TestDeepValidate_EvenEtcdClusterSize --- PASS: TestDeepValidate_EvenEtcdClusterSize (0.00s) === RUN TestDeepValidate_MissingEtcdMember --- PASS: TestDeepValidate_MissingEtcdMember (0.00s) === RUN TestPopulateClusterSpec_Proxy --- PASS: TestPopulateClusterSpec_Proxy (0.00s) === RUN TestPrecreateDNSNames --- PASS: TestPrecreateDNSNames (0.00s) === RUN TestDockerVersionUrlHash === RUN TestDockerVersionUrlHash/19.03.13-amd64 === RUN TestDockerVersionUrlHash/19.03.13-arm64 === RUN TestDockerVersionUrlHash/18.06.3-amd64 === RUN TestDockerVersionUrlHash/18.06.3-arm64 === RUN TestDockerVersionUrlHash/17.03.1-amd64 === RUN TestDockerVersionUrlHash/17.03.1-arm64 --- PASS: TestDockerVersionUrlHash (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/19.03.13-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-amd64 (0.00s) --- PASS: TestDockerVersionUrlHash/17.03.1-arm64 (0.00s) === RUN TestDockerVersionUrl === RUN TestDockerVersionUrl/19.03.13- === RUN TestDockerVersionUrl/19.03.13-arm === RUN TestDockerVersionUrl/-amd64 === RUN TestDockerVersionUrl/-arm64 === RUN TestDockerVersionUrl/18.06.3-amd64 === RUN TestDockerVersionUrl/18.06.3-arm64 === RUN TestDockerVersionUrl/19.03.13-amd64 === RUN TestDockerVersionUrl/19.03.13-arm64 --- PASS: TestDockerVersionUrl (0.00s) --- PASS: TestDockerVersionUrl/19.03.13- (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm (0.00s) --- PASS: TestDockerVersionUrl/-amd64 (0.00s) --- PASS: TestDockerVersionUrl/-arm64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-amd64 (0.00s) --- PASS: TestDockerVersionUrl/18.06.3-arm64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionUrl/19.03.13-arm64 (0.00s) === RUN TestDockerVersionHash === RUN TestDockerVersionHash/19.03.13- === RUN TestDockerVersionHash/19.03.13-arm === RUN TestDockerVersionHash/-amd64 === RUN TestDockerVersionHash/-arm64 === RUN TestDockerVersionHash/1.1.1-amd64 === RUN TestDockerVersionHash/1.1.1-arm64 === RUN TestDockerVersionHash/19.03.13-amd64 === RUN TestDockerVersionHash/19.03.13-arm64 --- PASS: TestDockerVersionHash (0.00s) --- PASS: TestDockerVersionHash/19.03.13- (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm (0.00s) --- PASS: TestDockerVersionHash/-amd64 (0.00s) --- PASS: TestDockerVersionHash/-arm64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-amd64 (0.00s) --- PASS: TestDockerVersionHash/1.1.1-arm64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-amd64 (0.00s) --- PASS: TestDockerVersionHash/19.03.13-arm64 (0.00s) === RUN TestDockerVersionsHashesAmd64 docker_test.go:245: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesAmd64 (0.00s) === RUN TestDockerVersionsHashesArm64 docker_test.go:260: VERIFY_HASHES not set, won't download & verify docker hashes --- SKIP: TestDockerVersionsHashesArm64 (0.00s) === RUN Test_FindCNIAssetFromEnvironmentVariable --- PASS: Test_FindCNIAssetFromEnvironmentVariable (0.00s) === RUN Test_FindCNIAssetFromDefaults122 --- PASS: Test_FindCNIAssetFromDefaults122 (0.27s) === RUN TestRemoveSharedPrefix --- PASS: TestRemoveSharedPrefix (0.00s) === RUN TestCreateEtcdCluster --- PASS: TestCreateEtcdCluster (0.00s) === RUN TestSetupNetworking W0407 01:58:11.306982 11648 new_cluster.go:1152] flannel UDP mode is not recommended; consider flannel-vxlan instead --- PASS: TestSetupNetworking (0.00s) === RUN TestDefaultImage --- PASS: TestDefaultImage (0.00s) === RUN TestPopulateCluster_Default_NoError --- PASS: TestPopulateCluster_Default_NoError (0.00s) === RUN TestPopulateCluster_Subnets === RUN TestPopulateCluster_Subnets/100.64.0.0/10 === RUN TestPopulateCluster_Subnets/10.0.0.0/9 === RUN TestPopulateCluster_Subnets/10.0.0.0/8 === RUN TestPopulateCluster_Subnets/::/0 --- PASS: TestPopulateCluster_Subnets (0.01s) --- PASS: TestPopulateCluster_Subnets/100.64.0.0/10 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/9 (0.00s) --- PASS: TestPopulateCluster_Subnets/10.0.0.0/8 (0.00s) --- PASS: TestPopulateCluster_Subnets/::/0 (0.00s) === RUN TestPopulateCluster_Docker_Spec --- PASS: TestPopulateCluster_Docker_Spec (0.00s) === RUN TestPopulateCluster_StorageDefault --- PASS: TestPopulateCluster_StorageDefault (0.00s) === RUN TestPopulateCluster_EvictionHard --- PASS: TestPopulateCluster_EvictionHard (0.00s) === RUN TestPopulateCluster_Custom_CIDR --- PASS: TestPopulateCluster_Custom_CIDR (0.00s) === RUN TestPopulateCluster_IsolateMasters --- PASS: TestPopulateCluster_IsolateMasters (0.00s) === RUN TestPopulateCluster_IsolateMastersFalse --- PASS: TestPopulateCluster_IsolateMastersFalse (0.00s) === RUN TestPopulateCluster_Name_Required --- PASS: TestPopulateCluster_Name_Required (0.00s) === RUN TestPopulateCluster_Zone_Required --- PASS: TestPopulateCluster_Zone_Required (0.00s) === RUN TestPopulateCluster_NetworkCIDR_Required --- PASS: TestPopulateCluster_NetworkCIDR_Required (0.00s) === RUN TestPopulateCluster_NonMasqueradeCIDR_Required --- PASS: TestPopulateCluster_NonMasqueradeCIDR_Required (0.00s) === RUN TestPopulateCluster_CloudProvider_Required --- PASS: TestPopulateCluster_CloudProvider_Required (0.00s) === RUN TestPopulateCluster_APIServerCount --- PASS: TestPopulateCluster_APIServerCount (0.00s) === RUN TestPopulateCluster_AnonymousAuth --- PASS: TestPopulateCluster_AnonymousAuth (0.00s) === RUN TestPopulateCluster_DockerVersion --- PASS: TestPopulateCluster_DockerVersion (0.00s) === RUN TestPopulateCluster_KubeController_High_Enough_Version --- PASS: TestPopulateCluster_KubeController_High_Enough_Version (0.00s) === RUN TestPopulateInstanceGroup_Name_Required --- PASS: TestPopulateInstanceGroup_Name_Required (0.00s) === RUN TestPopulateInstanceGroup_Role_Required --- PASS: TestPopulateInstanceGroup_Role_Required (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision --- PASS: TestPopulateInstanceGroup_AddTaintsCollision (0.00s) === RUN TestPopulateInstanceGroup_AddTaintsCollision3 --- PASS: TestPopulateInstanceGroup_AddTaintsCollision3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard --- PASS: TestPopulateInstanceGroup_EvictionHard (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard3 --- PASS: TestPopulateInstanceGroup_EvictionHard3 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard4 --- PASS: TestPopulateInstanceGroup_EvictionHard4 (0.00s) === RUN TestPopulateInstanceGroup_EvictionHard2 --- PASS: TestPopulateInstanceGroup_EvictionHard2 (0.00s) === RUN TestPopulateInstanceGroup_AddTaints --- PASS: TestPopulateInstanceGroup_AddTaints (0.00s) === RUN TestMachineArchitecture === RUN TestMachineArchitecture/t2.micro-amd64 === RUN TestMachineArchitecture/t3.micro-amd64 === RUN TestMachineArchitecture/a1.large-arm64 --- PASS: TestMachineArchitecture (0.00s) --- PASS: TestMachineArchitecture/t2.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/t3.micro-amd64 (0.00s) --- PASS: TestMachineArchitecture/a1.large-arm64 (0.00s) === RUN TestRuncVersionUrlHash === RUN TestRuncVersionUrlHash/1.100.0-amd64 === RUN TestRuncVersionUrlHash/1.100.0-arm64 === RUN TestRuncVersionUrlHash/1.1.0-amd64 === RUN TestRuncVersionUrlHash/1.1.0-arm64 --- PASS: TestRuncVersionUrlHash (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrlHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionUrl === RUN TestRuncVersionUrl/1.1.0- === RUN TestRuncVersionUrl/1.1.0-arm === RUN TestRuncVersionUrl/-amd64 === RUN TestRuncVersionUrl/-arm64 === RUN TestRuncVersionUrl/1.0.0-amd64 === RUN TestRuncVersionUrl/1.0.0-arm64 === RUN TestRuncVersionUrl/1.1.0-amd64 === RUN TestRuncVersionUrl/1.1.0-arm64 --- PASS: TestRuncVersionUrl (0.00s) --- PASS: TestRuncVersionUrl/1.1.0- (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm (0.00s) --- PASS: TestRuncVersionUrl/-amd64 (0.00s) --- PASS: TestRuncVersionUrl/-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionUrl/1.1.0-arm64 (0.00s) === RUN TestRuncVersionHash === RUN TestRuncVersionHash/1.1.0- === RUN TestRuncVersionHash/1.1.0-arm === RUN TestRuncVersionHash/-amd64 === RUN TestRuncVersionHash/-arm64 === RUN TestRuncVersionHash/1.0.0-amd64 === RUN TestRuncVersionHash/1.0.0-arm64 === RUN TestRuncVersionHash/1.100.0-amd64 === RUN TestRuncVersionHash/1.100.0-arm64 === RUN TestRuncVersionHash/1.1.0-amd64 === RUN TestRuncVersionHash/1.1.0-arm64 --- PASS: TestRuncVersionHash (0.00s) --- PASS: TestRuncVersionHash/1.1.0- (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm (0.00s) --- PASS: TestRuncVersionHash/-amd64 (0.00s) --- PASS: TestRuncVersionHash/-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.0.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.100.0-arm64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-amd64 (0.00s) --- PASS: TestRuncVersionHash/1.1.0-arm64 (0.00s) === RUN TestRuncVersionsHashesAmd64 runc_test.go:240: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesAmd64 (0.00s) === RUN TestRuncVersionsHashesArm64 runc_test.go:255: VERIFY_HASHES not set, won't download & verify runc hashes --- SKIP: TestRuncVersionsHashesArm64 (0.00s) === RUN Test_AssignSubnets === RUN Test_AssignSubnets/test-1 === RUN Test_AssignSubnets/test-2 I0407 01:58:11.341417 11648 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-3 I0407 01:58:11.341488 11648 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet a I0407 01:58:11.341501 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-4 I0407 01:58:11.341563 11648 subnets.go:224] Assigned CIDR 10.0.0.0/9 to subnet b I0407 01:58:11.341575 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-5 I0407 01:58:11.341637 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-6 I0407 01:58:11.341705 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet b === RUN Test_AssignSubnets/test-7 I0407 01:58:11.341803 11648 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0407 01:58:11.341833 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-8 I0407 01:58:11.341909 11648 subnets.go:205] Assigned CIDR 10.0.0.0/12 to subnet a I0407 01:58:11.341926 11648 subnets.go:224] Assigned CIDR 10.128.0.0/9 to subnet a === RUN Test_AssignSubnets/test-9 === RUN Test_AssignSubnets/test-10 I0407 01:58:11.342031 11648 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-11 === RUN Test_AssignSubnets/test-12 I0407 01:58:11.342138 11648 subnets.go:224] Assigned CIDR 10.0.0.0/8 to subnet a === RUN Test_AssignSubnets/test-13 I0407 01:58:11.342224 11648 subnets.go:205] Assigned CIDR 10.0.0.0/14 to subnet a I0407 01:58:11.342241 11648 subnets.go:205] Assigned CIDR 10.4.0.0/14 to subnet b I0407 01:58:11.342254 11648 subnets.go:205] Assigned CIDR 10.8.0.0/14 to subnet c I0407 01:58:11.342269 11648 subnets.go:224] Assigned CIDR 10.32.0.0/11 to subnet a I0407 01:58:11.342283 11648 subnets.go:224] Assigned CIDR 10.64.0.0/11 to subnet b I0407 01:58:11.342292 11648 subnets.go:224] Assigned CIDR 10.96.0.0/11 to subnet b I0407 01:58:11.342305 11648 subnets.go:224] Assigned CIDR 10.128.0.0/11 to subnet c I0407 01:58:11.342318 11648 subnets.go:224] Assigned CIDR 10.160.0.0/11 to subnet c --- PASS: Test_AssignSubnets (0.00s) --- PASS: Test_AssignSubnets/test-1 (0.00s) --- PASS: Test_AssignSubnets/test-2 (0.00s) --- PASS: Test_AssignSubnets/test-3 (0.00s) --- PASS: Test_AssignSubnets/test-4 (0.00s) --- PASS: Test_AssignSubnets/test-5 (0.00s) --- PASS: Test_AssignSubnets/test-6 (0.00s) --- PASS: Test_AssignSubnets/test-7 (0.00s) --- PASS: Test_AssignSubnets/test-8 (0.00s) --- PASS: Test_AssignSubnets/test-9 (0.00s) --- PASS: Test_AssignSubnets/test-10 (0.00s) --- PASS: Test_AssignSubnets/test-11 (0.00s) --- PASS: Test_AssignSubnets/test-12 (0.00s) --- PASS: Test_AssignSubnets/test-13 (0.00s) === RUN Test_TemplateFunctions_CloudControllerConfigArgv === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration === RUN Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Log_Level_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ExternalCloudControllerManager_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/No_CloudProvider_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/k8s_cluster_name (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Default_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Cluster-cidr_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/AllocateNodeCIDRs_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/ConfigureCloudRoutes_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/CIDRAllocatorType_Configuration#01 (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Election (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Leader_Migration (0.00s) --- PASS: Test_TemplateFunctions_CloudControllerConfigArgv/Disable_Controller (0.00s) === RUN Test_KarpenterInstanceTypes I0407 01:58:11.344112 11648 images.go:53] DescribeImagesPages: { ImageIds: ["ami-073c8c0760395aab8"] } --- PASS: Test_KarpenterInstanceTypes (0.00s) === RUN TestKopsFeatureEnabled === RUN TestKopsFeatureEnabled/Missing_feature === RUN TestKopsFeatureEnabled/Existing_feature I0407 01:58:11.344415 11648 featureflag.go:164] FeatureFlag "Scaleway"=true --- PASS: TestKopsFeatureEnabled (0.00s) --- PASS: TestKopsFeatureEnabled/Missing_feature (0.00s) --- PASS: TestKopsFeatureEnabled/Existing_feature (0.00s) === RUN Test_BuildMirroredAsset === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup === RUN Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup --- PASS: Test_BuildMirroredAsset (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/amd64/nodeup (0.00s) --- PASS: Test_BuildMirroredAsset/https://artifacts.k8s.io/binaries/kops/%s/linux/arm64/nodeup (0.00s) === RUN TestValidateFull_Default_Validates --- PASS: TestValidateFull_Default_Validates (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_NoDot --- PASS: TestValidateFull_ClusterName_InvalidDNS_NoDot (0.00s) === RUN TestValidateFull_ClusterName_InvalidDNS_Invalid --- PASS: TestValidateFull_ClusterName_InvalidDNS_Invalid (0.00s) === RUN TestValidateFull_ClusterName_Required --- PASS: TestValidateFull_ClusterName_Required (0.00s) === RUN TestValidateFull_UpdatePolicy_Valid === RUN TestValidateFull_UpdatePolicy_Valid/missing === RUN TestValidateFull_UpdatePolicy_Valid/automatic === RUN TestValidateFull_UpdatePolicy_Valid/external --- PASS: TestValidateFull_UpdatePolicy_Valid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/missing (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/automatic (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Valid/external (0.00s) === RUN TestValidateFull_UpdatePolicy_Invalid === RUN TestValidateFull_UpdatePolicy_Invalid/empty === RUN TestValidateFull_UpdatePolicy_Invalid/populated --- PASS: TestValidateFull_UpdatePolicy_Invalid (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/empty (0.00s) --- PASS: TestValidateFull_UpdatePolicy_Invalid/populated (0.00s) === RUN Test_Validate_Kubenet_With_14 --- PASS: Test_Validate_Kubenet_With_14 (0.00s) === RUN TestValidate_ClusterName_Import --- PASS: TestValidate_ClusterName_Import (0.00s) === RUN TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity --- PASS: TestValidate_ContainerRegistry_and_ContainerProxy_exclusivity (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup 2.324s === RUN TestGetASGTagsToDelete --- PASS: TestGetASGTagsToDelete (0.00s) === RUN TestProcessCompare --- PASS: TestProcessCompare (0.00s) === RUN TestAutoscalingGroupTerraformRender I0407 01:58:09.264226 11681 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender2602454262/001 I0407 01:58:09.264496 11681 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender2602454262/001 I0407 01:58:09.264726 11681 target.go:111] Terraform output is in /tmp/TestAutoscalingGroupTerraformRender2602454262/001 --- PASS: TestAutoscalingGroupTerraformRender (0.00s) === RUN TestTGsARNsChunks --- PASS: TestTGsARNsChunks (0.01s) === RUN TestGetEBSVolumeTagsToDelete --- PASS: TestGetEBSVolumeTagsToDelete (0.00s) === RUN TestSharedEgressOnlyInternetGatewayDoesNotRename I0407 01:58:09.271453 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0407 01:58:09.271556 11681 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0407 01:58:09.271600 11681 egressonlyinternetgateways.go:66] CreateEgressOnlyInternetGateway: { TagSpecifications: [{ ResourceType: "egress-only-internet-gateway", Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] }], VpcId: "vpc-1" } I0407 01:58:09.271753 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.271926 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.271989 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.272008 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.272252 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.272296 11681 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0407 01:58:09.272332 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.272397 11681 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0407 01:58:09.272471 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0407 01:58:09.272532 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.272580 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.272619 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.272635 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.272668 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.272721 11681 egressonlyinternetgateways.go:106] DescribeEgressOnlyInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0407 01:58:09.272776 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedEgressOnlyInternetGatewayDoesNotRename (0.00s) === RUN TestElasticIPCreate I0407 01:58:09.272891 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.272932 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.273023 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.273061 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.273083 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.273116 11681 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0407 01:58:09.273195 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.273379 11681 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0407 01:58:09.273433 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.273456 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.273482 11681 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0407 01:58:09.273557 11681 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.273711 11681 address.go:79] AllocateAddress: { Domain: "vpc", TagSpecifications: [{ ResourceType: "elastic-ip", Tags: [{ Key: "Name", Value: "eip1" }] }] } I0407 01:58:09.273774 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.273798 11681 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "AssociatedElasticIp", Value: "192.0.2.1" },{ Key: "AssociatedElasticIpAllocationId", Value: "eipalloc-1" }] } I0407 01:58:09.273834 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0407 01:58:09.273897 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.273937 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.273978 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.273994 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.274019 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.274043 11681 executor.go:111] Tasks: 1 done / 3 total; 1 can run I0407 01:58:09.274078 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.274129 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.274163 11681 executor.go:111] Tasks: 2 done / 3 total; 1 can run I0407 01:58:09.274209 11681 tags.go:165] DescribeTags { Filters: [{ Name: "key", Values: ["AssociatedElasticIp"] },{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.274258 11681 address.go:120] DescribeAddresses: { Filters: [{ Name: "public-ip", Values: ["192.0.2.1"] }] } I0407 01:58:09.274283 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["eipalloc-1"] }] } I0407 01:58:09.274320 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestElasticIPCreate (0.00s) === RUN TestSharedInternetGatewayDoesNotRename I0407 01:58:09.274378 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16" } I0407 01:58:09.274408 11681 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "Name", Value: "ExistingVPC" }] } I0407 01:58:09.274430 11681 internetgateways.go:66] CreateInternetGateway: { } I0407 01:58:09.274448 11681 tags.go:42] CreateTags { Resources: ["igw-1"], Tags: [{ Key: "Name", Value: "ExistingInternetGateway" }] } I0407 01:58:09.274496 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.274533 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.274568 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.274582 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.274644 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.274669 11681 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0407 01:58:09.274702 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.274757 11681 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0407 01:58:09.274848 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0407 01:58:09.274900 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.274937 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.274974 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.274988 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.275018 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.275052 11681 internetgateways.go:101] DescribeInternetGateways: { Filters: [{ Name: "attachment.vpc-id", Values: ["vpc-1"] }] } I0407 01:58:09.275116 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedInternetGatewayDoesNotRename (0.00s) === RUN TestLaunchTemplateTerraformRender I0407 01:58:09.275535 11681 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender588929388/001 I0407 01:58:09.275783 11681 target.go:111] Terraform output is in /tmp/TestLaunchTemplateTerraformRender588929388/001 --- PASS: TestLaunchTemplateTerraformRender (0.00s) === RUN TestParseRemovalRule --- PASS: TestParseRemovalRule (0.00s) === RUN TestPortRemovalRule --- PASS: TestPortRemovalRule (0.00s) === RUN TestPortRemovalRule_Zero --- PASS: TestPortRemovalRule_Zero (0.00s) === RUN TestSecurityGroupCreate I0407 01:58:09.276157 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.276200 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.276286 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.276325 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.276347 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.276370 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.276426 11681 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0407 01:58:09.276608 11681 securitygroups.go:40] CreateSecurityGroup: { Description: "Description", GroupName: "sg1", TagSpecifications: [{ ResourceType: "security-group", Tags: [{ Key: "Name", Value: "sg1" }] }], VpcId: "vpc-1" } I0407 01:58:09.276654 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["sg-1"] }] } I0407 01:58:09.276683 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0407 01:58:09.276735 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.276773 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.276812 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.276828 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.276855 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.276878 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.276913 11681 securitygroups.go:115] DescribeSecurityGroups: { Filters: [{ Name: "tag:Name", Values: ["sg1"] },{ Name: "vpc-id", Values: ["vpc-1"] },{ Name: "group-name", Values: ["sg1"] }] } I0407 01:58:09.276981 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSecurityGroupCreate (0.00s) === RUN Test_Subnet_ValidateRequired --- PASS: Test_Subnet_ValidateRequired (0.00s) === RUN Test_Subnet_CannotChangeSubnet --- PASS: Test_Subnet_CannotChangeSubnet (0.00s) === RUN TestSubnetCreate I0407 01:58:09.277192 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.277231 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.277306 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.277343 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.277365 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.277387 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.277423 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.277511 11681 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0407 01:58:09.277551 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.277573 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.277594 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0407 01:58:09.277655 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.277690 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.277729 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.277744 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.277769 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.277790 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.277824 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.277886 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.277912 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSubnetCreate (0.00s) === RUN TestSubnetCreateIPv6 I0407 01:58:09.278023 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.278061 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.278137 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.278173 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.278194 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.278216 11681 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0407 01:58:09.278252 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.278352 11681 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0407 01:58:09.278411 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.278619 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.278662 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.278692 11681 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 01:58:09.278730 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0407 01:58:09.278819 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.278869 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.278922 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.278939 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.278966 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.278990 11681 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0407 01:58:09.279030 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.279088 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.279108 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.279151 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6 (0.00s) === RUN TestSubnetCreateIPv6NetNum I0407 01:58:09.279256 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.279293 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.279369 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.279405 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.279427 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.279449 11681 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0407 01:58:09.279485 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.279533 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.279641 11681 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", Ipv6CidrBlock: "2001:db8:0:1::/64", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "subnet1" }] }], VpcId: "vpc-1" } I0407 01:58:09.279663 11681 vpcs.go:246] AssociateVpcCidrBlock: { AmazonProvidedIpv6CidrBlock: true, VpcId: "vpc-1" } I0407 01:58:09.279727 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.279776 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.279815 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run I0407 01:58:09.279935 11681 executor.go:111] Tasks: 0 done / 3 total; 1 can run I0407 01:58:09.279997 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.280066 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.280095 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.280142 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.280183 11681 executor.go:111] Tasks: 1 done / 3 total; 2 can run I0407 01:58:09.280244 11681 subnets.go:128] DescribeSubnets: { Filters: [{ Name: "tag:Name", Values: ["subnet1"] }] } I0407 01:58:09.280402 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.280445 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.280520 11681 executor.go:111] Tasks: 3 done / 3 total; 0 can run --- PASS: TestSubnetCreateIPv6NetNum (0.00s) === RUN TestSharedSubnetCreateDoesNotCreateNew I0407 01:58:09.280620 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.20.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "ExistingVPC" }] }] } I0407 01:58:09.280722 11681 subnets.go:110] CreateSubnet: { CidrBlock: "172.20.1.0/24", TagSpecifications: [{ ResourceType: "subnet", Tags: [{ Key: "Name", Value: "ExistingSubnet" }] }], VpcId: "vpc-1" } I0407 01:58:09.280839 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.280899 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.280957 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.280984 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.281096 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.281142 11681 tags.go:42] CreateTags { Resources: ["vpc-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0407 01:58:09.281195 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.281250 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.281427 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["subnet-1"] }] } I0407 01:58:09.281471 11681 tags.go:42] CreateTags { Resources: ["subnet-1"], Tags: [{ Key: "kubernetes.io/cluster/cluster.example.com", Value: "shared" }] } I0407 01:58:09.281519 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run I0407 01:58:09.281628 11681 executor.go:111] Tasks: 0 done / 2 total; 1 can run I0407 01:58:09.281687 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.281775 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.281804 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.281858 11681 executor.go:111] Tasks: 1 done / 2 total; 1 can run I0407 01:58:09.281916 11681 subnets.go:128] DescribeSubnets: { SubnetIds: ["subnet-1"] } I0407 01:58:09.282004 11681 executor.go:111] Tasks: 2 done / 2 total; 0 can run --- PASS: TestSharedSubnetCreateDoesNotCreateNew (0.00s) === RUN TestVPCCreate I0407 01:58:09.282121 11681 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:09.282175 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.282302 11681 vpcs.go:89] CreateVpc: { CidrBlock: "172.21.0.0/16", TagSpecifications: [{ ResourceType: "vpc", Tags: [{ Key: "Name", Value: "vpc1" }] }] } I0407 01:58:09.282362 11681 tags.go:165] DescribeTags { Filters: [{ Name: "resource-id", Values: ["vpc-1"] }] } I0407 01:58:09.282399 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.282435 11681 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:09.282494 11681 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:09.282552 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc1"] }] } I0407 01:58:09.282618 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.282644 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.282687 11681 vpcs.go:112] DescribeVpcs: { VpcIds: ["vpc-1"] } I0407 01:58:09.282725 11681 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestVPCCreate (0.00s) === RUN Test4758 --- PASS: Test4758 (0.00s) === RUN TestSharedVPCAdditionalCIDR I0407 01:58:09.282891 11681 vpcs.go:246] AssociateVpcCidrBlock: { CidrBlock: "172.22.0.0/16", VpcId: "vpc-1" } I0407 01:58:09.282973 11681 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:09.283031 11681 vpcs.go:112] DescribeVpcs: { Filters: [{ Name: "tag:Name", Values: ["vpc-1"] }] } I0407 01:58:09.283096 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsSupport", VpcId: "vpc-1" } I0407 01:58:09.283124 11681 vpcs.go:169] DescribeVpcAttribute: { Attribute: "enableDnsHostnames", VpcId: "vpc-1" } I0407 01:58:09.283174 11681 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestSharedVPCAdditionalCIDR (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awstasks 0.071s === RUN TestValidateRegion --- PASS: TestValidateRegion (0.00s) === RUN TestFindRegion --- PASS: TestFindRegion (0.00s) === RUN TestEC2TagSpecification === RUN TestEC2TagSpecification/No_tags === RUN TestEC2TagSpecification/simple_tag --- PASS: TestEC2TagSpecification (0.00s) --- PASS: TestEC2TagSpecification/No_tags (0.00s) --- PASS: TestEC2TagSpecification/simple_tag (0.00s) === RUN Test_GetResourceName32 --- PASS: Test_GetResourceName32 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/awsup 0.059s === RUN TestZoneToLocation === RUN TestZoneToLocation/test_case_0 === RUN TestZoneToLocation/test_case_1 === RUN TestZoneToLocation/test_case_2 --- PASS: TestZoneToLocation (0.00s) --- PASS: TestZoneToLocation/test_case_0 (0.00s) --- PASS: TestZoneToLocation/test_case_1 (0.00s) --- PASS: TestZoneToLocation/test_case_2 (0.00s) === RUN TestZoneToAvailabilityZoneNumber === RUN TestZoneToAvailabilityZoneNumber/test_case_0 === RUN TestZoneToAvailabilityZoneNumber/test_case_1 === RUN TestZoneToAvailabilityZoneNumber/test_case_2 --- PASS: TestZoneToAvailabilityZoneNumber (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_0 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_1 (0.00s) --- PASS: TestZoneToAvailabilityZoneNumber/test_case_2 (0.00s) === RUN TestFindEtcdStatus --- PASS: TestFindEtcdStatus (0.00s) === RUN TestGetCloudGroups --- PASS: TestGetCloudGroups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azure 0.032s === RUN TestDiskRenderAzure I0407 01:58:10.309475 11835 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRenderAzure (0.00s) === RUN TestDiskFind --- PASS: TestDiskFind (0.00s) === RUN TestDiskRun I0407 01:58:10.310070 11835 disk.go:112] Creating a new Disk with name: disk --- PASS: TestDiskRun (0.00s) === RUN TestDiskCheckChanges === RUN TestDiskCheckChanges/test_case_0 === RUN TestDiskCheckChanges/test_case_1 === RUN TestDiskCheckChanges/test_case_2 === RUN TestDiskCheckChanges/test_case_3 --- PASS: TestDiskCheckChanges (0.00s) --- PASS: TestDiskCheckChanges/test_case_0 (0.00s) --- PASS: TestDiskCheckChanges/test_case_1 (0.00s) --- PASS: TestDiskCheckChanges/test_case_2 (0.00s) --- PASS: TestDiskCheckChanges/test_case_3 (0.00s) === RUN TestLoadBalancerRenderAzure I0407 01:58:10.310344 11835 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRenderAzure (0.00s) === RUN TestLoadBalancerFind loadbalancer_test.go:124: *azuretasks.LoadBalancer {"Name":"loadbalancer","Lifecycle":"","ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Subnet":{"Name":"subnet","Lifecycle":"","ID":null,"ResourceGroup":null,"VirtualNetwork":null,"NatGateway":null,"NetworkSecurityGroup":null,"CIDR":null,"Shared":null},"External":true,"Tags":null,"ForAPIServer":false} --- PASS: TestLoadBalancerFind (0.00s) === RUN TestLoadBalancerRun I0407 01:58:10.311325 11835 loadbalancer.go:162] Creating a new Loadbalancer with name: loadbalancer --- PASS: TestLoadBalancerRun (0.00s) === RUN TestLoadBalancerCheckChanges === RUN TestLoadBalancerCheckChanges/test_case_0 === RUN TestLoadBalancerCheckChanges/test_case_1 === RUN TestLoadBalancerCheckChanges/test_case_2 === RUN TestLoadBalancerCheckChanges/test_case_3 --- PASS: TestLoadBalancerCheckChanges (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_0 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_1 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_2 (0.00s) --- PASS: TestLoadBalancerCheckChanges/test_case_3 (0.00s) === RUN TestPublicIPAddressRenderAzure I0407 01:58:10.311581 11835 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRenderAzure (0.00s) === RUN TestPublicIPAddressFind publicipaddress_test.go:102: *azuretasks.PublicIPAddress {"Name":"publicIPAddress","Lifecycle":"","ID":null,"ResourceGroup":{"Name":"rg","Lifecycle":"","Tags":null,"Shared":null},"Tags":null} --- PASS: TestPublicIPAddressFind (0.00s) === RUN TestPublicIPAddressRun I0407 01:58:10.311933 11835 publicipaddress.go:113] Creating a new Public IP Address with name: publicIPAddress --- PASS: TestPublicIPAddressRun (0.00s) === RUN TestPublicIPAddressCheckChanges === RUN TestPublicIPAddressCheckChanges/test_case_0 === RUN TestPublicIPAddressCheckChanges/test_case_1 === RUN TestPublicIPAddressCheckChanges/test_case_2 === RUN TestPublicIPAddressCheckChanges/test_case_3 --- PASS: TestPublicIPAddressCheckChanges (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_0 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_1 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_2 (0.00s) --- PASS: TestPublicIPAddressCheckChanges/test_case_3 (0.00s) === RUN TestResourceGroupRenderAzure I0407 01:58:10.312128 11835 resourcegroup.go:108] Creating a new Resource Group with name: rg I0407 01:58:10.312140 11835 resourcegroup.go:110] Updating a Resource Group with name: rg --- PASS: TestResourceGroupRenderAzure (0.00s) === RUN TestResourceGroupFind --- PASS: TestResourceGroupFind (0.00s) === RUN TestResourceGroupRun I0407 01:58:10.312345 11835 resourcegroup.go:108] Creating a new Resource Group with name: rg --- PASS: TestResourceGroupRun (0.00s) === RUN TestResourceGroupCheckChanges === RUN TestResourceGroupCheckChanges/test_case_0 === RUN TestResourceGroupCheckChanges/test_case_1 === RUN TestResourceGroupCheckChanges/test_case_2 === RUN TestResourceGroupCheckChanges/test_case_3 --- PASS: TestResourceGroupCheckChanges (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_0 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_1 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_2 (0.00s) --- PASS: TestResourceGroupCheckChanges/test_case_3 (0.00s) === RUN TestRoleAssignmentRenderAzure --- PASS: TestRoleAssignmentRenderAzure (0.00s) === RUN TestRoleAssignmentFind --- PASS: TestRoleAssignmentFind (0.00s) === RUN TestRoleAssignmentFind_NoPrincipalID --- PASS: TestRoleAssignmentFind_NoPrincipalID (0.00s) === RUN TestRoleAssignmentCheckChanges === RUN TestRoleAssignmentCheckChanges/test_case_0 === RUN TestRoleAssignmentCheckChanges/test_case_1 === RUN TestRoleAssignmentCheckChanges/test_case_2 === RUN TestRoleAssignmentCheckChanges/test_case_3 --- PASS: TestRoleAssignmentCheckChanges (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_0 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_1 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_2 (0.00s) --- PASS: TestRoleAssignmentCheckChanges/test_case_3 (0.00s) === RUN TestSubnetRenderAzure I0407 01:58:10.312742 11835 subnet.go:126] Creating a new Subnet with name: vnet --- PASS: TestSubnetRenderAzure (0.00s) === RUN TestSubnetFind --- PASS: TestSubnetFind (0.00s) === RUN TestSubnetCheckChanges === RUN TestSubnetCheckChanges/test_case_0 === RUN TestSubnetCheckChanges/test_case_1 === RUN TestSubnetCheckChanges/test_case_2 === RUN TestSubnetCheckChanges/test_case_3 --- PASS: TestSubnetCheckChanges (0.00s) --- PASS: TestSubnetCheckChanges/test_case_0 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_1 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_2 (0.00s) --- PASS: TestSubnetCheckChanges/test_case_3 (0.00s) === RUN TestVirtualNetworkRenderAzure I0407 01:58:10.312933 11835 virtualnetwork.go:122] Creating a new Virtual Network with name: vnet --- PASS: TestVirtualNetworkRenderAzure (0.00s) === RUN TestVirtualNetworkFind --- PASS: TestVirtualNetworkFind (0.00s) === RUN TestVirtualNetworkRun I0407 01:58:10.313147 11835 virtualnetwork.go:122] Creating a new Virtual Network with name: rg --- PASS: TestVirtualNetworkRun (0.00s) === RUN TestVirtualNetworkCheckChanges === RUN TestVirtualNetworkCheckChanges/test_case_0 === RUN TestVirtualNetworkCheckChanges/test_case_1 === RUN TestVirtualNetworkCheckChanges/test_case_2 === RUN TestVirtualNetworkCheckChanges/test_case_3 --- PASS: TestVirtualNetworkCheckChanges (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_0 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_1 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_2 (0.00s) --- PASS: TestVirtualNetworkCheckChanges/test_case_3 (0.00s) === RUN TestSubnetIDParse --- PASS: TestSubnetIDParse (0.00s) === RUN TestLoadBalancerIDParse --- PASS: TestLoadBalancerIDParse (0.00s) === RUN TestVMScaleSetRenderAzure I0407 01:58:10.313490 11835 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRenderAzure (0.00s) === RUN TestVMScaleSetFind --- PASS: TestVMScaleSetFind (0.00s) === RUN TestVMScaleSetRun I0407 01:58:10.313902 11835 vmscaleset.go:220] Creating a new VM Scale Set with name: vmss --- PASS: TestVMScaleSetRun (0.00s) === RUN TestVMScaleSetCheckChanges === RUN TestVMScaleSetCheckChanges/test_case_0 === RUN TestVMScaleSetCheckChanges/test_case_1 === RUN TestVMScaleSetCheckChanges/test_case_2 === RUN TestVMScaleSetCheckChanges/test_case_3 --- PASS: TestVMScaleSetCheckChanges (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_0 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_1 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_2 (0.00s) --- PASS: TestVMScaleSetCheckChanges/test_case_3 (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/azuretasks 0.037s === RUN Test_Find === RUN Test_Find/successfully_found_volume === RUN Test_Find/no_volume_found === RUN Test_Find/error_from_server --- PASS: Test_Find (0.00s) --- PASS: Test_Find/successfully_found_volume (0.00s) --- PASS: Test_Find/no_volume_found (0.00s) --- PASS: Test_Find/error_from_server (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/dotasks 0.032s === RUN TestProjectIAMBinding I0407 01:58:12.064069 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.064604 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.064628 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.067314 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.067365 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.067572 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestProjectIAMBinding (0.00s) === RUN TestServiceAccount I0407 01:58:12.067708 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.067817 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.067838 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.067958 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.067982 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.068044 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestServiceAccount (0.00s) === RUN TestStorageBucketIAM I0407 01:58:12.068159 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.068386 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.068426 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.068758 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run I0407 01:58:12.068784 12695 executor.go:111] Tasks: 0 done / 1 total; 1 can run I0407 01:58:12.068898 12695 executor.go:111] Tasks: 1 done / 1 total; 0 can run --- PASS: TestStorageBucketIAM (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/gcetasks 0.062s === RUN Test_OpenstackCloud_MakeCloud === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured === RUN Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value --- PASS: Test_OpenstackCloud_MakeCloud (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_false_when_not_configured (0.00s) --- PASS: Test_OpenstackCloud_MakeCloud/Ignore_volume_microversion_is_set_to_configured_value (0.00s) === RUN Test_OpenstackCloud_GetApiIngressStatus === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match === RUN Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled === RUN Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled --- PASS: Test_OpenstackCloud_GetApiIngressStatus (0.02s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_set_multiple_IPs_match (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/Loadbalancer_configured_master_public_name_not_set (0.00s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_no_floating_enabled (0.01s) --- PASS: Test_OpenstackCloud_GetApiIngressStatus/No_Loadbalancer_configured_with_floating_enabled (0.00s) === RUN Test_BuildClients === RUN Test_BuildClients/Empty_openstack_spec_means_no_load_balancer === RUN Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned === RUN Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned === RUN Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned === RUN Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled --- PASS: Test_BuildClients (0.00s) --- PASS: Test_BuildClients/Empty_openstack_spec_means_no_load_balancer (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_but_no_router,_an_error_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_set,_and_there_is_a_router,_a_load-balancer_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_octavia_is_not_set,_network_should_be_returned (0.00s) --- PASS: Test_BuildClients/When_router_is_set,_but_no_LB,_FIP_support_should_be_enabled (0.00s) === RUN Test_WaitForStatusActiveIsSuccessful --- PASS: Test_WaitForStatusActiveIsSuccessful (1.00s) === RUN Test_WaitForStatusActiveResultsInInstanceNotFound --- PASS: Test_WaitForStatusActiveResultsInInstanceNotFound (1.00s) === RUN Test_WaitForStatusActiveResultsInUnableToCreateServer --- PASS: Test_WaitForStatusActiveResultsInUnableToCreateServer (1.00s) === RUN Test_WaitForStatusActiveResultsInTimeout --- PASS: Test_WaitForStatusActiveResultsInTimeout (1.00s) === RUN TestGetMetadataFromMetadataServiceReturnsNotFoundError --- PASS: TestGetMetadataFromMetadataServiceReturnsNotFoundError (0.00s) === RUN TestGetMetadataFromMetadataService --- PASS: TestGetMetadataFromMetadataService (0.00s) === RUN TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound --- PASS: TestGetMetadataFromConfigDriveReturnsErrorWhenNoDeviceIsFound (0.00s) === RUN TestGetMetadataFromConfigDrive --- PASS: TestGetMetadataFromConfigDrive (0.00s) === RUN TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound --- PASS: TestGetMetadataReturnsLastErrorWhenNoMetadataWasFound (0.00s) === RUN TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromConfigDriveWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenConfigDriveFails --- PASS: TestGetMetadataFromServiceEndpointWhenConfigDriveFails (0.00s) === RUN TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder --- PASS: TestGetMetadataFromServiceEndpointWhenItIsFirstInSearchOrder (0.00s) === RUN TestGetMetadataFromConfigDriveWhenServiceEndpointFails --- PASS: TestGetMetadataFromConfigDriveWhenServiceEndpointFails (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstack 4.069s === RUN TestFilterPortsReturnsAllPorts --- PASS: TestFilterPortsReturnsAllPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPort --- PASS: TestFilterPortsReturnsOnlyTaggedPort (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPorts --- PASS: TestFilterPortsReturnsOnlyTaggedPorts (0.00s) === RUN TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername --- PASS: TestFilterPortsReturnsOnlyTaggedPortsWithLongClustername (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsPortAddressPairsWhenFindIsNil (0.00s) === RUN Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges --- PASS: Test_Port_GetAllowedAddressPairs_ReturnsModifiedPortAddressPairsWhenNoChanges (0.00s) === RUN Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges --- PASS: Test_Port_GetActualAllowedAddressPairs_ReturnsModifiedPortAddressPairsOnChanges (0.00s) === RUN Test_Port_GetDependencies --- PASS: Test_Port_GetDependencies (0.00s) === RUN Test_NewPortTaskFromCloud === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName === RUN Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups === RUN Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs --- PASS: Test_NewPortTaskFromCloud (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/empty_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_not_nil_populates_the_InstanceGroupName (0.00s) --- PASS: Test_NewPortTaskFromCloud/fully_populated_cloud_port_found_port_nil_populates_the_InstanceGroupName_if_found (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_additional_security_groups (0.00s) --- PASS: Test_NewPortTaskFromCloud/cloud_port_found_port_not_nil_honors_allowed_address_pairs (0.00s) === RUN Test_Port_Find === RUN Test_Port_Find/nothing_found === RUN Test_Port_Find/port_found_no_tags === RUN Test_Port_Find/port_found_with_tags === RUN Test_Port_Find/multiple_ports_found === RUN Test_Port_Find/error_listing_ports === RUN Test_Port_Find/port_found_with_allowed_address_pairs --- PASS: Test_Port_Find (0.00s) --- PASS: Test_Port_Find/nothing_found (0.00s) --- PASS: Test_Port_Find/port_found_no_tags (0.00s) --- PASS: Test_Port_Find/port_found_with_tags (0.00s) --- PASS: Test_Port_Find/multiple_ports_found (0.00s) --- PASS: Test_Port_Find/error_listing_ports (0.00s) --- PASS: Test_Port_Find/port_found_with_allowed_address_pairs (0.00s) === RUN Test_Port_CheckChanges === RUN Test_Port_CheckChanges/actual_nil_all_required_fields_set === RUN Test_Port_CheckChanges/actual_nil_required_field_Name_nil === RUN Test_Port_CheckChanges/actual_nil_required_field_Network_nil === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set === RUN Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set === RUN Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set --- PASS: Test_Port_CheckChanges (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_all_required_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Name_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_nil_required_field_Network_nil (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_all_changeable_fields_set#01 (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Name_set (0.00s) --- PASS: Test_Port_CheckChanges/actual_not_nil_unchangeable_field_Network_set (0.00s) === RUN Test_Port_RenderOpenstack === RUN Test_Port_RenderOpenstack/actual_not_nil === RUN Test_Port_RenderOpenstack/actual_nil_success === RUN Test_Port_RenderOpenstack/actual_nil_cloud_error === RUN Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success --- PASS: Test_Port_RenderOpenstack (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_not_nil (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_success (0.00s) --- PASS: Test_Port_RenderOpenstack/actual_nil_cloud_error (0.00s) --- PASS: Test_Port_RenderOpenstack/changes_in_allowed_address_pairs_success (0.00s) === RUN Test_Port_createOptsFromPortTask === RUN Test_Port_createOptsFromPortTask/all_fields_set === RUN Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups --- PASS: Test_Port_createOptsFromPortTask (0.00s) --- PASS: Test_Port_createOptsFromPortTask/all_fields_set (0.00s) --- PASS: Test_Port_createOptsFromPortTask/nonexisting_additional_security_groups (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/openstacktasks 0.043s === RUN TestCreateValidScalewayProfile === RUN TestCreateValidScalewayProfile/Only_environment_set === RUN TestCreateValidScalewayProfile/Only_profile_set === RUN TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID === RUN TestCreateValidScalewayProfile/Environment_should_override_whole_profile === RUN TestCreateValidScalewayProfile/Empty_profile_for_integration_tests --- PASS: TestCreateValidScalewayProfile (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_environment_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Only_profile_set (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_profile's_default_project_ID (0.00s) --- PASS: TestCreateValidScalewayProfile/Environment_should_override_whole_profile (0.00s) --- PASS: TestCreateValidScalewayProfile/Empty_profile_for_integration_tests (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/scaleway 0.027s === RUN TestWriteLocalsOutputs === RUN TestWriteLocalsOutputs/empty_map === RUN TestWriteLocalsOutputs/single_output === RUN TestWriteLocalsOutputs/list_output --- PASS: TestWriteLocalsOutputs (0.00s) --- PASS: TestWriteLocalsOutputs/empty_map (0.00s) --- PASS: TestWriteLocalsOutputs/single_output (0.00s) --- PASS: TestWriteLocalsOutputs/list_output (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraform 0.028s === RUN TestGetOutputs === RUN TestGetOutputs/empty_map === RUN TestGetOutputs/single_output === RUN TestGetOutputs/list_output === RUN TestGetOutputs/duplicate_names === RUN TestGetOutputs/duplicate_values --- PASS: TestGetOutputs (0.00s) --- PASS: TestGetOutputs/empty_map (0.00s) --- PASS: TestGetOutputs/single_output (0.00s) --- PASS: TestGetOutputs/list_output (0.00s) --- PASS: TestGetOutputs/duplicate_names (0.00s) --- PASS: TestGetOutputs/duplicate_values (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter 0.004s === RUN TestKeypairDeps --- PASS: TestKeypairDeps (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/fitasks 0.030s === RUN TestArchiveDependencies --- PASS: TestArchiveDependencies (0.00s) === RUN TestBindMountCommands I0407 01:58:15.390605 12992 bindmount.go:223] running mount command [mount --bind /containerized_mounter /containerized_mounter] I0407 01:58:15.390727 12992 bindmount.go:232] running mount command [mount -o remount,exec /containerized_mounter] I0407 01:58:15.390738 12992 bindmount.go:223] running mount command [mount --rbind /var/lib/kubelet/ /containerized_mounter/rootfs/var/lib/kubelet] I0407 01:58:15.390751 12992 bindmount.go:243] running mount command [mount --make-rshared /containerized_mounter/rootfs/var/lib/kubelet] I0407 01:58:15.390762 12992 bindmount.go:223] running mount command [mount --bind -o ro /proc /containerized_mounter/rootfs/proc] I0407 01:58:15.390771 12992 bindmount.go:223] running mount command [mount --bind -o ro /dev /containerized_mounter/rootfs/dev] I0407 01:58:15.390781 12992 bindmount.go:223] running mount command [mount --bind -o ro /etc/resolv.conf /containerized_mounter/rootfs/etc/resolv.conf] --- PASS: TestBindMountCommands (0.00s) === RUN TestBindMountDependencies --- PASS: TestBindMountDependencies (0.00s) === RUN TestFileDependencies === RUN TestFileDependencies/user === RUN TestFileDependencies/parentDir === RUN TestFileDependencies/afterFiles --- PASS: TestFileDependencies (0.00s) --- PASS: TestFileDependencies/user (0.00s) --- PASS: TestFileDependencies/parentDir (0.00s) --- PASS: TestFileDependencies/afterFiles (0.00s) === RUN TestIssueCertFileDependencies --- PASS: TestIssueCertFileDependencies (0.00s) === RUN TestLoadImageTask_Deps --- PASS: TestLoadImageTask_Deps (0.00s) === RUN TestServiceTask_Deps --- PASS: TestServiceTask_Deps (0.00s) === RUN TestServiceTask_UnknownTypes W0407 01:58:15.391177 12992 service.go:110] Unhandled type *nodetasks.FakeTask in Service::GetDependencies: &{} --- PASS: TestServiceTask_UnknownTypes (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/nodeup/nodetasks 0.369s === RUN TestStringSlicesEqual --- PASS: TestStringSlicesEqual (0.00s) === RUN TestStringSlicesEqualIgnoreOrder --- PASS: TestStringSlicesEqualIgnoreOrder (0.00s) === RUN TestHashString --- PASS: TestHashString (0.00s) === RUN TestSanitizeString --- PASS: TestSanitizeString (0.00s) PASS ok k8s.io/kops/upup/pkg/fi/utils 0.004s === RUN TestFindDistribution --- PASS: TestFindDistribution (0.00s) PASS ok k8s.io/kops/util/pkg/distributions 0.005s === RUN TestWithTee --- PASS: TestWithTee (0.00s) PASS ok k8s.io/kops/util/pkg/exec 0.004s === RUN TestNewHasher === RUN TestNewHasher/sha256 === RUN TestNewHasher/sha1 === RUN TestNewHasher/md5 --- PASS: TestNewHasher (0.00s) --- PASS: TestNewHasher/sha256 (0.00s) --- PASS: TestNewHasher/sha1 (0.00s) --- PASS: TestNewHasher/md5 (0.00s) === RUN TestMemberFromString === RUN TestMemberFromString/sha256_1 === RUN TestMemberFromString/sha256_2 === RUN TestMemberFromString/sha256_3 === RUN TestMemberFromString/sha1_1 === RUN TestMemberFromString/sha1_2 === RUN TestMemberFromString/sha1_3 === RUN TestMemberFromString/md5_1 === RUN TestMemberFromString/md5_2 === RUN TestMemberFromString/md5_3 --- PASS: TestMemberFromString (0.00s) --- PASS: TestMemberFromString/sha256_1 (0.00s) --- PASS: TestMemberFromString/sha256_2 (0.00s) --- PASS: TestMemberFromString/sha256_3 (0.00s) --- PASS: TestMemberFromString/sha1_1 (0.00s) --- PASS: TestMemberFromString/sha1_2 (0.00s) --- PASS: TestMemberFromString/sha1_3 (0.00s) --- PASS: TestMemberFromString/md5_1 (0.00s) --- PASS: TestMemberFromString/md5_2 (0.00s) --- PASS: TestMemberFromString/md5_3 (0.00s) === RUN TestFromString === RUN TestFromString/sha256 === RUN TestFromString/sha1 === RUN TestFromString/md5 === RUN TestFromString/unknown --- PASS: TestFromString (0.00s) --- PASS: TestFromString/sha256 (0.00s) --- PASS: TestFromString/sha1 (0.00s) --- PASS: TestFromString/md5 (0.00s) --- PASS: TestFromString/unknown (0.00s) PASS ok k8s.io/kops/util/pkg/hashing 0.004s === RUN TestKeys --- PASS: TestKeys (0.00s) === RUN TestSortedKeys --- PASS: TestSortedKeys (0.00s) PASS ok k8s.io/kops/util/pkg/maps 0.004s === RUN TestGetProxyEnvVars W0407 01:58:15.045502 12997 proxy.go:34] EgressProxy set but no proxy host provided --- PASS: TestGetProxyEnvVars (0.00s) PASS ok k8s.io/kops/util/pkg/proxy 0.020s === RUN TestSet === RUN TestSet/simple_setting === RUN TestSet/setting_with_wildcard === RUN TestSet/creating_missing_objects === RUN TestSet/set_int === RUN TestSet/set_int32 === RUN TestSet/set_int64 === RUN TestSet/set_int_pointer === RUN TestSet/set_int32_pointer === RUN TestSet/set_int64_pointer === RUN TestSet/set_enum === RUN TestSet/set_enum_slice === RUN TestSet/append_enum_slice === RUN TestSet/set_env_var === RUN TestSet/set_env_var_with_val === RUN TestSet/set_duration --- PASS: TestSet (0.00s) --- PASS: TestSet/simple_setting (0.00s) --- PASS: TestSet/setting_with_wildcard (0.00s) --- PASS: TestSet/creating_missing_objects (0.00s) --- PASS: TestSet/set_int (0.00s) --- PASS: TestSet/set_int32 (0.00s) --- PASS: TestSet/set_int64 (0.00s) --- PASS: TestSet/set_int_pointer (0.00s) --- PASS: TestSet/set_int32_pointer (0.00s) --- PASS: TestSet/set_int64_pointer (0.00s) --- PASS: TestSet/set_enum (0.00s) --- PASS: TestSet/set_enum_slice (0.00s) --- PASS: TestSet/append_enum_slice (0.00s) --- PASS: TestSet/set_env_var (0.00s) --- PASS: TestSet/set_env_var_with_val (0.00s) --- PASS: TestSet/set_duration (0.00s) === RUN TestSetInvalidPath === RUN TestSetInvalidPath/setting_with_wildcard === RUN TestSetInvalidPath/creating_missing_objects === RUN TestSetInvalidPath/set_int === RUN TestSetInvalidPath/set_int32 === RUN TestSetInvalidPath/set_int64 --- PASS: TestSetInvalidPath (0.00s) --- PASS: TestSetInvalidPath/setting_with_wildcard (0.00s) --- PASS: TestSetInvalidPath/creating_missing_objects (0.00s) --- PASS: TestSetInvalidPath/set_int (0.00s) --- PASS: TestSetInvalidPath/set_int32 (0.00s) --- PASS: TestSetInvalidPath/set_int64 (0.00s) === RUN TestUnset === RUN TestUnset/simple_unsetting === RUN TestUnset/unsetting_with_wildcard === RUN TestUnset/uset_int === RUN TestUnset/unset_int32 === RUN TestUnset/unset_int64 === RUN TestUnset/unset_int_pointer === RUN TestUnset/unset_int32_pointer === RUN TestUnset/unset_int64_pointer === RUN TestUnset/unset_enum === RUN TestUnset/unset_enum_slice --- PASS: TestUnset (0.00s) --- PASS: TestUnset/simple_unsetting (0.00s) --- PASS: TestUnset/unsetting_with_wildcard (0.00s) --- PASS: TestUnset/uset_int (0.00s) --- PASS: TestUnset/unset_int32 (0.00s) --- PASS: TestUnset/unset_int64 (0.00s) --- PASS: TestUnset/unset_int_pointer (0.00s) --- PASS: TestUnset/unset_int32_pointer (0.00s) --- PASS: TestUnset/unset_int64_pointer (0.00s) --- PASS: TestUnset/unset_enum (0.00s) --- PASS: TestUnset/unset_enum_slice (0.00s) === RUN TestUnsetInvalidPath === RUN TestUnsetInvalidPath/usetting_with_wildcard === RUN TestUnsetInvalidPath/missing_objects --- PASS: TestUnsetInvalidPath (0.00s) --- PASS: TestUnsetInvalidPath/usetting_with_wildcard (0.00s) --- PASS: TestUnsetInvalidPath/missing_objects (0.00s) === RUN TestParseFieldPath === RUN TestParseFieldPath/test_Spec.Containers.Image === RUN TestParseFieldPath/test_Spec.Containers[0].Image === RUN TestParseFieldPath/test_Spec.Containers[*].Image --- PASS: TestParseFieldPath (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers.Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[0].Image (0.00s) --- PASS: TestParseFieldPath/test_Spec.Containers[*].Image (0.00s) === RUN Test_Merge --- PASS: Test_Merge (0.00s) PASS ok k8s.io/kops/util/pkg/reflectutils 0.021s === RUN TestGetUniqueStrings --- PASS: TestGetUniqueStrings (0.00s) === RUN TestContains --- PASS: TestContains (0.00s) PASS ok k8s.io/kops/util/pkg/slice 0.003s === RUN TestSplitToSections --- PASS: TestSplitToSections (0.00s) PASS ok k8s.io/kops/util/pkg/text 0.003s === RUN TestAzureBlobPathBase === RUN TestAzureBlobPathBase/Test_case_0 === RUN TestAzureBlobPathBase/Test_case_1 === RUN TestAzureBlobPathBase/Test_case_2 --- PASS: TestAzureBlobPathBase (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathBase/Test_case_2 (0.00s) === RUN TestAzureBlobPathPath === RUN TestAzureBlobPathPath/Test_case_0 === RUN TestAzureBlobPathPath/Test_case_1 === RUN TestAzureBlobPathPath/Test_case_2 --- PASS: TestAzureBlobPathPath (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_0 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_1 (0.00s) --- PASS: TestAzureBlobPathPath/Test_case_2 (0.00s) === RUN TestAzureBlobPathJoin --- PASS: TestAzureBlobPathJoin (0.00s) === RUN TestCreateFile --- PASS: TestCreateFile (0.00s) === RUN TestWriteTo --- PASS: TestWriteTo (0.00s) === RUN TestMemFsCreateFile --- PASS: TestMemFsCreateFile (0.00s) === RUN TestMemFsReadDir --- PASS: TestMemFsReadDir (0.00s) === RUN TestMemFsReadTree --- PASS: TestMemFsReadTree (0.00s) === RUN Test_VFSPath --- PASS: Test_VFSPath (0.00s) === RUN Test_S3Path_Parse --- PASS: Test_S3Path_Parse (0.00s) PASS ok k8s.io/kops/util/pkg/vfs 0.027s === RUN TestGSRenderTerraform === RUN TestGSRenderTerraform/gs://foo/bar --- PASS: TestGSRenderTerraform (0.00s) --- PASS: TestGSRenderTerraform/gs://foo/bar (0.00s) === RUN TestS3RenderTerraform === RUN TestS3RenderTerraform/s3://foo/bar W0407 01:58:17.889962 13095 s3context.go:235] Unable to read bucket encryption policy for "foo" in region "us-east-1": will encrypt using AES256 --- PASS: TestS3RenderTerraform (0.00s) --- PASS: TestS3RenderTerraform/s3://foo/bar (0.00s) PASS ok k8s.io/kops/util/pkg/vfs/tests 0.060s >>> kops: Entering fakeroot... >>> kops*: Running postcheck for kops >>> kops*: Preparing package kops... >>> kops*: Stripping binaries >>> kops*: Scanning shared objects >>> kops*: Tracing dependencies... >>> kops*: Package size: 147.7 MB >>> kops*: Compressing data... >>> kops*: Create checksum... >>> kops*: Create kops-1.28.4-r2.apk >>> kops: Build complete at Sun, 07 Apr 2024 02:01:01 +0000 elapsed time 0h 6m 27s >>> kops: Cleaning up srcdir >>> kops: Cleaning up pkgdir >>> kops: Uninstalling dependencies... (1/5) Purging .makedepends-kops (20240407.015436) (2/5) Purging kubernetes (1.29.3-r1) (3/5) Purging go (1.22.2-r0) (4/5) Purging bash (5.2.26-r0) Executing bash-5.2.26-r0.pre-deinstall (5/5) Purging readline (8.2.10-r0) Executing busybox-1.36.1-r25.trigger OK: 377 MiB in 107 packages >>> kops: Updating the testing/x86_64 repository index... >>> kops: Signing the index...